Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Installer.exe

Overview

General Information

Sample name:Installer.exe
Analysis ID:1542680
MD5:100c1978b1a6ed1e40d5c9fded0abffd
SHA1:90e359d598e934330a203869523862277ed55d23
SHA256:1f1c85afdcd76e891c5fb050a981f3dfe5e81e44d30d00a9f69d3f4e54d44af6
Tags:exeuser-KnownStormChaser

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to dynamically determine API calls
Program does not show much activity (idle)

Classification

  • System is w10x64
  • Installer.exe (PID: 3332 cmdline: "C:\Users\user\Desktop\Installer.exe" MD5: 100C1978B1A6ED1E40D5C9FDED0ABFFD)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Installer.exeVirustotal: Detection: 9%Perma Link
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\Installer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Installer.exeVirustotal: Detection: 9%
Source: C:\Users\user\Desktop\Installer.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: credui.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: mprapi.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: mscms.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: msdrm.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: crl86x.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: coloradapterclient.dllJump to behavior
Source: C:\Users\user\Desktop\Installer.exeSection loaded: cryptsp.dllJump to behavior
Source: Installer.exeStatic file information: File size 41963008 > 1048576
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E14E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_008E14E0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E14E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_008E14E0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E11A3 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_008E11A3
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E13C9 SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,0_2_008E13C9
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E116C Sleep,Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_008E116C
Source: C:\Users\user\Desktop\Installer.exeCode function: 0_2_008E1160 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_008E1160
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Installer.exe10%VirustotalBrowse
Installer.exe8%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542680
Start date and time:2024-10-26 07:00:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 20s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Installer.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 13
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target Installer.exe, PID 3332 because there are no executed function
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Entropy (8bit):0.0061802705883473195
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:Installer.exe
File size:41'963'008 bytes
MD5:100c1978b1a6ed1e40d5c9fded0abffd
SHA1:90e359d598e934330a203869523862277ed55d23
SHA256:1f1c85afdcd76e891c5fb050a981f3dfe5e81e44d30d00a9f69d3f4e54d44af6
SHA512:73d0368190a22b617cdcf6b15ef2832cc2872872245c635a845daec8710129f63745fcda3c12b5abecf8727789d6357fa096c22ce8cd4a2cc90274eca21b7f44
SSDEEP:384:YqRamKDUHou+Pjz+UzBVb7Vb7+5a05ChoCW:YEamKDITCBVb7Vb7U+VW
TLSH:D0972AC3F60A74E1E3D1A5B59C65CB76C56FBE660B70D62ABF84D30CA5A24C2C906183
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g...............'.....J...............0....@..................................P....@... ............................
Icon Hash:00928e8e8686b000
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:01:08
Start date:26/10/2024
Path:C:\Users\user\Desktop\Installer.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\Installer.exe"
Imagebase:0x8e0000
File size:41'963'008 bytes
MD5 hash:100C1978B1A6ED1E40D5C9FDED0ABFFD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
    • String ID:
    • API String ID: 1672962128-0
    • Opcode ID: 4716a8375118697e06d3b28cd736aae602360482d3e7f7d91653c12705424727
    • Instruction ID: e7e5162ca3d623ec6488bfbff371a893d250c0da09667a9d657e2c779851d45a
    • Opcode Fuzzy Hash: 4716a8375118697e06d3b28cd736aae602360482d3e7f7d91653c12705424727
    • Instruction Fuzzy Hash: BC817A71A04794CFDF20DFAAD88836DBBE1FB56344F104928DA85DB311E7759848CB92
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: AddressProc$HandleLibraryLoadModule
    • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
    • API String ID: 384173800-1835852900
    • Opcode ID: f9ca6d8c1c35eb743e2c06361c80915f330b90f2ef4dfb04de410d7502d382b2
    • Instruction ID: da8b4494156e60243e98732e7d2a9f0284fb0efda781cc45c77a05ad3d3f1224
    • Opcode Fuzzy Hash: f9ca6d8c1c35eb743e2c06361c80915f330b90f2ef4dfb04de410d7502d382b2
    • Instruction Fuzzy Hash: A60171B18087848BC740BFBAA94921DBFE4FB42350F01543DDA89DB301E7708818CB93
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
    • String ID:
    • API String ID: 2053141405-0
    • Opcode ID: da381c3d883d4dcd34308a822f610d7789fc428f6a1ab0370f9f5e3dea00c450
    • Instruction ID: c4e251b014231f52912b451c97d982426ba2065092ea54b5acbd95512d26b2f2
    • Opcode Fuzzy Hash: da381c3d883d4dcd34308a822f610d7789fc428f6a1ab0370f9f5e3dea00c450
    • Instruction Fuzzy Hash: 844137B0A047948FDB50EF6AD88835DBBE1FF56340F10492DD985DB311E7749954CB42
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
    • String ID:
    • API String ID: 2230096795-0
    • Opcode ID: c34ff6f6776f53743e7717759bef722cef345b4c989cc3f04c66db0d6953a6b3
    • Instruction ID: dcac910d3a6c28a4c3d2d5732d00858f3cc2763989f9ac7f55e9bd6ac06d7cdc
    • Opcode Fuzzy Hash: c34ff6f6776f53743e7717759bef722cef345b4c989cc3f04c66db0d6953a6b3
    • Instruction Fuzzy Hash: BC4158B0A047908BDB10DF6AD8C831DBBE1FF5A340F00492CD945DB310EB749954CB92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
    • String ID:
    • API String ID: 1672962128-0
    • Opcode ID: f712bd1db99f54a7648e1dfa83afe0435cbab2e831ccca1c7bb63d8a8d11ccaf
    • Instruction ID: 90095b69226cf916939e44332bea30f69af58be6a2de8fa37ba5de3cbc225a6a
    • Opcode Fuzzy Hash: f712bd1db99f54a7648e1dfa83afe0435cbab2e831ccca1c7bb63d8a8d11ccaf
    • Instruction Fuzzy Hash: D2518871A047908FDB20DFAAD8C875EBBE1FB5A340F10452CE945EB320E774A954CB82
    APIs
    Strings
    • Address %p has no image-section, xrefs: 008E1A6B
    • Mingw-w64 runtime failure:, xrefs: 008E18E8
    • VirtualQuery failed for %d bytes at address %p, xrefs: 008E1A57
    • VirtualProtect failed with code 0x%x, xrefs: 008E1A26
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: QueryVirtualabortfwritevfprintf
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 2513968241-1534286854
    • Opcode ID: 79333a8c9cc91f4b4303b8cf859c30c42b655fb5799b1df990a42fb8c825c927
    • Instruction ID: 27d174b293142f934882bf92ce2dbd117da04aa0f01ea86a5afe2ff20ac395f0
    • Opcode Fuzzy Hash: 79333a8c9cc91f4b4303b8cf859c30c42b655fb5799b1df990a42fb8c825c927
    • Instruction Fuzzy Hash: EE518FB15047908FCB10EF2AD88565EFBF4FF95354F458A2CE988DB211E734E8048B92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: signal
    • String ID:
    • API String ID: 1946981877-0
    • Opcode ID: 4188632eb724b75a69bd9c4866214c490eda60e5bd5a6aa968c242d1f261c3a6
    • Instruction ID: 5d9f4c834e953ef268a0f6709292290e53fd89d40911ef5f4f12392ac0c65566
    • Opcode Fuzzy Hash: 4188632eb724b75a69bd9c4866214c490eda60e5bd5a6aa968c242d1f261c3a6
    • Instruction Fuzzy Hash: 413130B05082818AEF606F6AD58832EB6D4FF57358F514D0DE9C5CB291CBB9C8849B93
    Strings
    • Unknown pseudo relocation protocol version %d., xrefs: 008E1D73
    • Unknown pseudo relocation bit size %d., xrefs: 008E1BED
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 008E1BA0
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 0-1286557213
    • Opcode ID: 935a1702449029a8940e19a95ce4a13feb91e2577e4e80fae1b190199cc1c1b4
    • Instruction ID: e1df2a5d9dfd806793465e71cbe9c428f32e093810db64b2108fc6dfe94e59da
    • Opcode Fuzzy Hash: 935a1702449029a8940e19a95ce4a13feb91e2577e4e80fae1b190199cc1c1b4
    • Instruction Fuzzy Hash: 4E819171A047998BCF10DF6AE88476DB7F1FF86350F158929E958EB214E330E954CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: __p__commode__p__fmode__set_app_type
    • String ID:
    • API String ID: 3338496922-0
    • Opcode ID: c50e263cb8528f854047279576f19c1e3c1660bc5532d0bbf7161c92f088ca95
    • Instruction ID: 5eda53f41e08a4a24a1931f73819dd4710fd45face0055f7ded0aa239c7a1cb8
    • Opcode Fuzzy Hash: c50e263cb8528f854047279576f19c1e3c1660bc5532d0bbf7161c92f088ca95
    • Instruction Fuzzy Hash: 9021E770600AD1CFCB20EF26C84936933E1FB52344F544968C468DF265E77A99C9DB52
    APIs
    Strings
    • Unknown error, xrefs: 008E1832
    • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 008E187F
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: 8e90059d39608e7ca04425d83220d319f03378349d8b1fe2857befdb17505de3
    • Instruction ID: 1a1fb6e0b23448adf279e31d02d9792ae3dba3ac364b20c1ca54b1c850b71bc7
    • Opcode Fuzzy Hash: 8e90059d39608e7ca04425d83220d319f03378349d8b1fe2857befdb17505de3
    • Instruction Fuzzy Hash: 7701D6B0408B85CBD700AF15E58841ABFF1FF8A350F42489CE9C886269CB32D8A8C743
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$memcpystrlen
    • String ID:
    • API String ID: 3553820921-0
    • Opcode ID: eebf5ce5b0136022f7f2b9269182c9e41e0998627784adf12ccf171883b7d037
    • Instruction ID: 5f0106240ad8e476cc4809c1212d35642d919593d308d87bf498bcd8e05811ae
    • Opcode Fuzzy Hash: eebf5ce5b0136022f7f2b9269182c9e41e0998627784adf12ccf171883b7d037
    • Instruction Fuzzy Hash: 073132B1A047A58FCB20DF29D884799BBE1FB5A340F008A29D949EB311E735A915CF81
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: malloc$memcpystrlen
    • String ID:
    • API String ID: 3553820921-0
    • Opcode ID: 53a11fb6b8056acf9d68c33287640822c30a7f7328cce900be24ba10b35df2fe
    • Instruction ID: 3154c0f57df60266139358193b226e5e1eef31259e2dbab482729b5c17c56f16
    • Opcode Fuzzy Hash: 53a11fb6b8056acf9d68c33287640822c30a7f7328cce900be24ba10b35df2fe
    • Instruction Fuzzy Hash: 1721F2B59047A5CFCB10DF29D88465DBBF1FB99340B11892DD949AB321E730A911CF82
    APIs
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,008E2153,?,?,?,?,?,008E1768), ref: 008E1F8E
    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,008E2153,?,?,?,?,?,008E1768), ref: 008E1FB5
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,008E2153,?,?,?,?,?,008E1768), ref: 008E1FBC
    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,008E2153,?,?,?,?,?,008E1768), ref: 008E1FDC
    Memory Dump Source
    • Source File: 00000000.00000002.3315567852.00000000008E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008E0000, based on PE: true
    • Associated: 00000000.00000002.3315548599.00000000008E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315585828.00000000008E4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315602833.00000000008E7000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008E8000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315620093.00000000008EB000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3315656358.00000000008EC000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_8e0000_Installer.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeaveValue
    • String ID:
    • API String ID: 682475483-0
    • Opcode ID: 4149a081425fb18211a0e1d26538eeedeef2e6d5f1d56ee2c0b4fdd68feda279
    • Instruction ID: 42e91cafca20b7b8f908575b7e972f70420649e3069fd1e5920b51aa9c253a94
    • Opcode Fuzzy Hash: 4149a081425fb18211a0e1d26538eeedeef2e6d5f1d56ee2c0b4fdd68feda279
    • Instruction Fuzzy Hash: DCF0C8B26047908BCB10BFBAE8C851A7BF4FA11350B050128EE44CB315EB30A818CBE2