Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample name:PO.exe
Analysis ID:1558395
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • PO.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\PO.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • PO.exe (PID: 7828 cmdline: "C:\Users\user\Desktop\PO.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.2653471033.0000000002153000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000000.00000002.1853737660.0000000005213000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: PO.exeAvira: detected
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.binAvira URL Cloud: Label: malware
      Source: PO.exeReversingLabs: Detection: 83%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: global trafficTCP traffic: 192.168.2.8:49716 -> 173.249.193.48:80
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000003.00000002.2677713944.0000000034160000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin$
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin)
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin4
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin8
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binH
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binN
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binP
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin_8
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binf-9bc86c8e8c94k
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bing
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binj
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bink
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binl
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binp
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bint
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin~
      Source: PO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: PO.exe, 00000003.00000001.1851856220.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: PO.exe, 00000003.00000001.1851856220.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_6FED1B5F0_2_6FED1B5F
      Source: PO.exeStatic PE information: invalid certificate
      Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsb4357.tmpJump to behavior
      Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: PO.exeReversingLabs: Detection: 83%
      Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000003.00000002.2653471033.0000000002153000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1853737660.0000000005213000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_6FED1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FED1B5F
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsz4B76.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\PO.exeAPI/Special instruction interceptor: Address: 5222FD0
      Source: C:\Users\user\Desktop\PO.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\PO.exeRDTSC instruction interceptor: First address: 51F96E2 second address: 51F96E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F12B0BADA56h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\PO.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F12B0B90C96h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\PO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsz4B76.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\PO.exe TID: 7832Thread sleep time: -170000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\PO.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C92000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000003.00000002.2657641573.0000000004C5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,
      Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end nodegraph_0-2286
      Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end nodegraph_0-2499
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_6FED1B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FED1B5F
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      PO.exe83%ReversingLabsWin32.Trojan.GuLoader
      PO.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsz4B76.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin80%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bint0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin40%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binj0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin~0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binf-9bc86c8e8c94k0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin)0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin_80%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bing0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin$0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binH0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binP0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binN0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bink0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binl0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin8PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdPO.exe, 00000003.00000001.1851856220.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
        high
        http://173.249.193.48/VdpAwrpsFeHTHv196.binPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000003.00000002.2677713944.0000000034160000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.bin4PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.bintPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binf-9bc86c8e8c94kPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.bin~PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
          high
          http://173.249.193.48/VdpAwrpsFeHTHv196.bin)PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://173.249.193.48/VdpAwrpsFeHTHv196.bin_8PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdPO.exe, 00000003.00000001.1851856220.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
            high
            http://173.249.193.48/VdpAwrpsFeHTHv196.binjPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://173.249.193.48/VdpAwrpsFeHTHv196.bingPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.ftp.ftp://ftp.gopher.PO.exe, 00000003.00000001.1851856220.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
              high
              http://173.249.193.48/VdpAwrpsFeHTHv196.binHPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorPO.exefalse
                high
                http://173.249.193.48/VdpAwrpsFeHTHv196.bin$PO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.binPPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.binpPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binNPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binkPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://173.249.193.48/VdpAwrpsFeHTHv196.binlPO.exe, 00000003.00000002.2657641573.0000000004C74000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  173.249.193.48
                  unknownUnited States
                  11878TZULOUSfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1558395
                  Start date and time:2024-11-19 12:55:17 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 6m 46s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:PO.exe
                  Detection:MAL
                  Classification:mal84.troj.evad.winEXE@3/11@0/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: PO.exe
                  TimeTypeDescription
                  06:57:06API Interceptor17x Sleep call for process: PO.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  173.249.193.48stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48/dlDSZQaZvoFz216.bin
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  TZULOUSMagnetnaalene.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.108
                  stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.48
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  • 173.249.193.66
                  la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                  • 173.249.236.72
                  byte.arm5.elfGet hashmaliciousOkiruBrowse
                  • 173.249.236.51
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\nsz4B76.tmp\System.dllstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                        8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                          8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                            Dhl Delivery(AWB 9849791014).exeGet hashmaliciousGuLoaderBrowse
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):52
                              Entropy (8bit):4.0121618346445365
                              Encrypted:false
                              SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                              MD5:F298228D2D42CED0A00B0C5320000835
                              SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                              SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                              SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                              Malicious:false
                              Reputation:low
                              Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):5.737556724687435
                              Encrypted:false
                              SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                              MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                              SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                              SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                              SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Joe Sandbox View:
                              • Filename: stormskridtets.exe, Detection: malicious, Browse
                              • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                              • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                              • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                              • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                              • Filename: Dhl Delivery(AWB 9849791014).exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):589
                              Entropy (8bit):4.277818373535095
                              Encrypted:false
                              SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                              MD5:E80E34F461528DF8F86C4248C971B2AD
                              SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                              SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                              SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                              Malicious:false
                              Reputation:low
                              Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):276701
                              Entropy (8bit):1.2570216910370695
                              Encrypted:false
                              SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                              MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                              SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                              SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                              SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                              Malicious:false
                              Reputation:low
                              Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):313672
                              Entropy (8bit):1.2567166720965932
                              Encrypted:false
                              SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                              MD5:17B0342D31B6E728E13DF79009833371
                              SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                              SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                              SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                              Malicious:false
                              Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):207881
                              Entropy (8bit):7.331635651026833
                              Encrypted:false
                              SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                              MD5:749F30B7C897431F55057BFE15DF7228
                              SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                              SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                              SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                              Malicious:false
                              Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):16857
                              Entropy (8bit):4.532822901243277
                              Encrypted:false
                              SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                              MD5:143CC97C03735690BA675F029A4A3A16
                              SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                              SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                              SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                              Malicious:false
                              Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):244482
                              Entropy (8bit):1.2509108197987615
                              Encrypted:false
                              SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                              MD5:E6AC7A31DA2D4322339135AD20EB0F23
                              SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                              SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                              SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                              Malicious:false
                              Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):430713
                              Entropy (8bit):1.2530301266200883
                              Encrypted:false
                              SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                              MD5:8ED0D91C7C65B02A5630D1A012895C3D
                              SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                              SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                              SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                              Malicious:false
                              Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):223405
                              Entropy (8bit):1.2642457624863013
                              Encrypted:false
                              SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                              MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                              SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                              SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                              SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                              Malicious:false
                              Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                              Process:C:\Users\user\Desktop\PO.exe
                              File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                              Category:dropped
                              Size (bytes):385914
                              Entropy (8bit):1.2561626561864936
                              Encrypted:false
                              SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                              MD5:A4946227DE4DC2A79BF473A3D09C4247
                              SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                              SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                              SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                              Malicious:false
                              Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):6.460432078632097
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:PO.exe
                              File size:915'632 bytes
                              MD5:53441f2de2d573f3b2e4fb35c248229b
                              SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                              SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                              SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                              SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                              TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                              Icon Hash:d3672eac1a0c662c
                              Entrypoint:0x4034a2
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                              Signature Valid:false
                              Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 25/01/2024 10:16:23 24/01/2027 10:16:23
                              Subject Chain
                              • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                              Version:3
                              Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                              Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                              Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                              Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+14h], ebx
                              mov dword ptr [esp+10h], 0040A2E0h
                              mov dword ptr [esp+1Ch], ebx
                              call dword ptr [004080CCh]
                              call dword ptr [004080D0h]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [007A8A6Ch], eax
                              je 00007F12B0D70303h
                              push ebx
                              call 00007F12B0D735F1h
                              cmp eax, ebx
                              je 00007F12B0D702F9h
                              push 00000C00h
                              call eax
                              mov esi, 004082B0h
                              push esi
                              call 00007F12B0D7356Bh
                              push esi
                              call dword ptr [00408154h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], 00000000h
                              jne 00007F12B0D702DCh
                              push 0000000Bh
                              call 00007F12B0D735C4h
                              push 00000009h
                              call 00007F12B0D735BDh
                              push 00000007h
                              mov dword ptr [007A8A64h], eax
                              call 00007F12B0D735B1h
                              cmp eax, ebx
                              je 00007F12B0D70301h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007F12B0D702F9h
                              or byte ptr [007A8A6Fh], 00000040h
                              push ebp
                              call dword ptr [00408038h]
                              push ebx
                              call dword ptr [00408298h]
                              mov dword ptr [007A8B38h], eax
                              push ebx
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebx
                              push 0079FF08h
                              call dword ptr [0040818Ch]
                              push 0040A2C8h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                              RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                              RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                              RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                              RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                              RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                              RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                              RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                              RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                              RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                              RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                              RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                              DLLImport
                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Nov 19, 2024 12:57:03.739087105 CET4971680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:04.751576900 CET4971680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:06.751647949 CET4971680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:07.863063097 CET4971780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:08.876626015 CET4971780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:10.876621008 CET4971780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:11.987248898 CET4971880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:13.001630068 CET4971880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:15.001662016 CET4971880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:16.114245892 CET4971980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:17.126612902 CET4971980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:19.126667976 CET4971980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:20.237679958 CET4972080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:21.251863003 CET4972080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:23.251625061 CET4972080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:24.362371922 CET4972180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:25.376663923 CET4972180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:27.376629114 CET4972180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:28.534202099 CET4972280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:29.548492908 CET4972280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:31.548504114 CET4972280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:32.659894943 CET4972380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:33.673548937 CET4972380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:35.689147949 CET4972380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:36.784348011 CET4972480192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:37.798521042 CET4972480192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:39.814558983 CET4972480192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:40.910722971 CET4972580192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:41.923624992 CET4972580192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:43.923734903 CET4972580192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:45.037460089 CET4972680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:46.048552036 CET4972680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:48.048554897 CET4972680192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:49.159704924 CET4972780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:50.173621893 CET4972780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:52.189312935 CET4972780192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:53.285808086 CET4972880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:54.298604965 CET4972880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:56.298716068 CET4972880192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:57.409874916 CET4972980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:57:58.424330950 CET4972980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:00.423579931 CET4972980192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:01.534667969 CET4973080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:02.548630953 CET4973080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:04.548675060 CET4973080192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:05.661429882 CET4973180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:06.673618078 CET4973180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:08.689372063 CET4973180192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:09.784683943 CET4973280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:10.798691988 CET4973280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:12.798727036 CET4973280192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:13.909338951 CET4973380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:14.923649073 CET4973380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:16.939280033 CET4973380192.168.2.8173.249.193.48
                              Nov 19, 2024 12:58:20.954902887 CET4973380192.168.2.8173.249.193.48

                              Click to jump to process

                              Click to jump to process

                              Click to jump to process

                              Target ID:0
                              Start time:06:56:11
                              Start date:19/11/2024
                              Path:C:\Users\user\Desktop\PO.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\PO.exe"
                              Imagebase:0x400000
                              File size:915'632 bytes
                              MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1853737660.0000000005213000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:06:56:55
                              Start date:19/11/2024
                              Path:C:\Users\user\Desktop\PO.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\PO.exe"
                              Imagebase:0x400000
                              File size:915'632 bytes
                              MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.2653471033.0000000002153000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:27%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:18.5%
                                Total number of Nodes:703
                                Total number of Limit Nodes:16
                                execution_graph 2988 6fed166d 2994 6fed1516 2988->2994 2990 6fed16cb GlobalFree 2991 6fed16a0 2991->2990 2992 6fed1685 2992->2990 2992->2991 2993 6fed16b7 VirtualFree 2992->2993 2993->2990 2996 6fed151c 2994->2996 2995 6fed1522 2995->2992 2996->2995 2997 6fed152e GlobalFree 2996->2997 2997->2992 2240 4034a2 SetErrorMode GetVersion 2241 4034e1 2240->2241 2242 4034e7 2240->2242 2243 4067e3 5 API calls 2241->2243 2330 406773 GetSystemDirectoryW 2242->2330 2243->2242 2245 4034fd lstrlenA 2245->2242 2246 40350d 2245->2246 2333 4067e3 GetModuleHandleA 2246->2333 2249 4067e3 5 API calls 2250 40351b 2249->2250 2251 4067e3 5 API calls 2250->2251 2252 403527 #17 OleInitialize SHGetFileInfoW 2251->2252 2339 4063ee lstrcpynW 2252->2339 2255 403573 GetCommandLineW 2340 4063ee lstrcpynW 2255->2340 2257 403585 2341 405cf0 2257->2341 2260 4036d4 GetTempPathW 2345 403471 2260->2345 2262 4036ec 2263 4036f0 GetWindowsDirectoryW lstrcatW 2262->2263 2264 403746 DeleteFileW 2262->2264 2265 403471 12 API calls 2263->2265 2355 403015 GetTickCount GetModuleFileNameW 2264->2355 2269 40370c 2265->2269 2266 405cf0 CharNextW 2268 4035c3 2266->2268 2268->2266 2274 4036bf 2268->2274 2276 4036bd 2268->2276 2269->2264 2271 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2269->2271 2270 40375a 2272 40380d 2270->2272 2277 4037fd 2270->2277 2282 405cf0 CharNextW 2270->2282 2275 403471 12 API calls 2271->2275 2489 4039e3 2272->2489 2472 4063ee lstrcpynW 2274->2472 2280 40373e 2275->2280 2276->2260 2383 403abd 2277->2383 2280->2264 2280->2272 2294 403779 2282->2294 2283 403947 2286 4039cb ExitProcess 2283->2286 2287 40394f GetCurrentProcess OpenProcessToken 2283->2287 2284 403827 2496 405a54 2284->2496 2292 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2287->2292 2293 40399b 2287->2293 2289 4037d7 2473 405dcb 2289->2473 2290 40383d 2439 4059bf 2290->2439 2292->2293 2297 4067e3 5 API calls 2293->2297 2294->2289 2294->2290 2300 4039a2 2297->2300 2303 4039b7 ExitWindowsEx 2300->2303 2304 4039c4 2300->2304 2301 403853 lstrcatW 2302 40385e lstrcatW lstrcmpiW 2301->2302 2302->2272 2306 40387a 2302->2306 2303->2286 2303->2304 2504 40140b 2304->2504 2309 403886 2306->2309 2310 40387f 2306->2310 2308 4037f2 2488 4063ee lstrcpynW 2308->2488 2500 4059a2 CreateDirectoryW 2309->2500 2442 405925 CreateDirectoryW 2310->2442 2315 40388b SetCurrentDirectoryW 2316 4038a6 2315->2316 2317 40389b 2315->2317 2447 4063ee lstrcpynW 2316->2447 2503 4063ee lstrcpynW 2317->2503 2322 4038f2 CopyFileW 2327 4038b4 2322->2327 2323 40393b 2324 4061b4 36 API calls 2323->2324 2324->2272 2326 40642b 17 API calls 2326->2327 2327->2323 2327->2326 2329 403926 CloseHandle 2327->2329 2448 40642b 2327->2448 2465 4061b4 MoveFileExW 2327->2465 2469 4059d7 CreateProcessW 2327->2469 2329->2327 2331 406795 wsprintfW LoadLibraryExW 2330->2331 2331->2245 2334 406809 GetProcAddress 2333->2334 2335 4067ff 2333->2335 2337 403514 2334->2337 2336 406773 3 API calls 2335->2336 2338 406805 2336->2338 2337->2249 2338->2334 2338->2337 2339->2255 2340->2257 2342 405cf6 2341->2342 2343 4035aa CharNextW 2342->2343 2344 405cfd CharNextW 2342->2344 2343->2260 2343->2268 2344->2342 2507 40669d 2345->2507 2347 403487 2347->2262 2348 40347d 2348->2347 2516 405cc3 lstrlenW CharPrevW 2348->2516 2351 4059a2 2 API calls 2352 403495 2351->2352 2519 405f13 2352->2519 2523 405ee4 GetFileAttributesW CreateFileW 2355->2523 2357 403055 2378 403065 2357->2378 2524 4063ee lstrcpynW 2357->2524 2359 40307b 2525 405d0f lstrlenW 2359->2525 2363 40308c GetFileSize 2364 403186 2363->2364 2368 4030a3 2363->2368 2530 402fb1 2364->2530 2366 40318f 2369 4031bf GlobalAlloc 2366->2369 2366->2378 2565 40345a SetFilePointer 2366->2565 2368->2364 2370 4031f2 2368->2370 2368->2378 2379 402fb1 6 API calls 2368->2379 2562 403444 2368->2562 2541 40345a SetFilePointer 2369->2541 2374 402fb1 6 API calls 2370->2374 2373 4031da 2542 40324c 2373->2542 2374->2378 2375 4031a8 2376 403444 ReadFile 2375->2376 2380 4031b3 2376->2380 2378->2270 2379->2368 2380->2369 2380->2378 2382 403223 SetFilePointer 2382->2378 2384 4067e3 5 API calls 2383->2384 2385 403ad1 2384->2385 2386 403ad7 2385->2386 2387 403ae9 2385->2387 2594 406335 wsprintfW 2386->2594 2595 4062bc 2387->2595 2391 403b38 lstrcatW 2392 403ae7 2391->2392 2586 403d93 2392->2586 2393 4062bc 3 API calls 2393->2391 2396 405dcb 18 API calls 2398 403b6a 2396->2398 2397 403bfe 2399 405dcb 18 API calls 2397->2399 2398->2397 2400 4062bc 3 API calls 2398->2400 2401 403c04 2399->2401 2402 403b9c 2400->2402 2403 403c14 LoadImageW 2401->2403 2404 40642b 17 API calls 2401->2404 2402->2397 2407 403bbd lstrlenW 2402->2407 2410 405cf0 CharNextW 2402->2410 2405 403cba 2403->2405 2406 403c3b RegisterClassW 2403->2406 2404->2403 2409 40140b 2 API calls 2405->2409 2408 403c71 SystemParametersInfoW CreateWindowExW 2406->2408 2438 403cc4 2406->2438 2411 403bf1 2407->2411 2412 403bcb lstrcmpiW 2407->2412 2408->2405 2413 403cc0 2409->2413 2415 403bba 2410->2415 2414 405cc3 3 API calls 2411->2414 2412->2411 2416 403bdb GetFileAttributesW 2412->2416 2417 403d93 18 API calls 2413->2417 2413->2438 2418 403bf7 2414->2418 2415->2407 2419 403be7 2416->2419 2420 403cd1 2417->2420 2600 4063ee lstrcpynW 2418->2600 2419->2411 2422 405d0f 2 API calls 2419->2422 2423 403d60 2420->2423 2424 403cdd ShowWindow 2420->2424 2422->2411 2601 405529 OleInitialize 2423->2601 2426 406773 3 API calls 2424->2426 2428 403cf5 2426->2428 2427 403d66 2429 403d82 2427->2429 2430 403d6a 2427->2430 2431 403d03 GetClassInfoW 2428->2431 2433 406773 3 API calls 2428->2433 2432 40140b 2 API calls 2429->2432 2436 40140b 2 API calls 2430->2436 2430->2438 2434 403d17 GetClassInfoW RegisterClassW 2431->2434 2435 403d2d DialogBoxParamW 2431->2435 2432->2438 2433->2431 2434->2435 2437 40140b 2 API calls 2435->2437 2436->2438 2437->2438 2438->2272 2440 4067e3 5 API calls 2439->2440 2441 403842 lstrcatW 2440->2441 2441->2301 2441->2302 2443 403884 2442->2443 2444 405976 GetLastError 2442->2444 2443->2315 2444->2443 2445 405985 SetFileSecurityW 2444->2445 2445->2443 2446 40599b GetLastError 2445->2446 2446->2443 2447->2327 2461 406438 2448->2461 2449 406683 2450 4038e5 DeleteFileW 2449->2450 2625 4063ee lstrcpynW 2449->2625 2450->2322 2450->2327 2452 406651 lstrlenW 2452->2461 2453 40642b 10 API calls 2453->2452 2456 406566 GetSystemDirectoryW 2456->2461 2457 4062bc 3 API calls 2457->2461 2458 406579 GetWindowsDirectoryW 2458->2461 2459 40669d 5 API calls 2459->2461 2460 4065f4 lstrcatW 2460->2461 2461->2449 2461->2452 2461->2453 2461->2456 2461->2457 2461->2458 2461->2459 2461->2460 2462 4065ad SHGetSpecialFolderLocation 2461->2462 2463 40642b 10 API calls 2461->2463 2623 406335 wsprintfW 2461->2623 2624 4063ee lstrcpynW 2461->2624 2462->2461 2464 4065c5 SHGetPathFromIDListW CoTaskMemFree 2462->2464 2463->2461 2464->2461 2466 4061d5 2465->2466 2467 4061c8 2465->2467 2466->2327 2626 40603a 2467->2626 2470 405a16 2469->2470 2471 405a0a CloseHandle 2469->2471 2470->2327 2471->2470 2472->2276 2660 4063ee lstrcpynW 2473->2660 2475 405ddc 2661 405d6e CharNextW CharNextW 2475->2661 2478 4037e3 2478->2272 2487 4063ee lstrcpynW 2478->2487 2479 40669d 5 API calls 2485 405df2 2479->2485 2480 405e23 lstrlenW 2481 405e2e 2480->2481 2480->2485 2483 405cc3 3 API calls 2481->2483 2484 405e33 GetFileAttributesW 2483->2484 2484->2478 2485->2478 2485->2480 2486 405d0f 2 API calls 2485->2486 2667 40674c FindFirstFileW 2485->2667 2486->2480 2487->2308 2488->2277 2490 4039fb 2489->2490 2491 4039ed CloseHandle 2489->2491 2670 403a28 2490->2670 2491->2490 2497 405a69 2496->2497 2498 405a7d MessageBoxIndirectW 2497->2498 2499 403835 ExitProcess 2497->2499 2498->2499 2501 4059b2 2500->2501 2502 4059b6 GetLastError 2500->2502 2501->2315 2502->2501 2503->2316 2505 401389 2 API calls 2504->2505 2506 401420 2505->2506 2506->2286 2513 4066aa 2507->2513 2508 406720 2509 406725 CharPrevW 2508->2509 2511 406746 2508->2511 2509->2508 2510 406713 CharNextW 2510->2508 2510->2513 2511->2348 2512 405cf0 CharNextW 2512->2513 2513->2508 2513->2510 2513->2512 2514 4066ff CharNextW 2513->2514 2515 40670e CharNextW 2513->2515 2514->2513 2515->2510 2517 40348f 2516->2517 2518 405cdf lstrcatW 2516->2518 2517->2351 2518->2517 2520 405f20 GetTickCount GetTempFileNameW 2519->2520 2521 4034a0 2520->2521 2522 405f56 2520->2522 2521->2262 2522->2520 2522->2521 2523->2357 2524->2359 2526 405d1d 2525->2526 2527 405d23 CharPrevW 2526->2527 2528 403081 2526->2528 2527->2526 2527->2528 2529 4063ee lstrcpynW 2528->2529 2529->2363 2531 402fd2 2530->2531 2532 402fba 2530->2532 2535 402fe2 GetTickCount 2531->2535 2536 402fda 2531->2536 2533 402fc3 DestroyWindow 2532->2533 2534 402fca 2532->2534 2533->2534 2534->2366 2538 402ff0 CreateDialogParamW ShowWindow 2535->2538 2539 403013 2535->2539 2566 40681f 2536->2566 2538->2539 2539->2366 2541->2373 2544 403265 2542->2544 2543 403293 2546 403444 ReadFile 2543->2546 2544->2543 2583 40345a SetFilePointer 2544->2583 2547 40329e 2546->2547 2548 4031e6 2547->2548 2549 4032b0 GetTickCount 2547->2549 2550 4033dd 2547->2550 2548->2378 2548->2382 2549->2548 2556 4032dc 2549->2556 2551 40341f 2550->2551 2554 4033e1 2550->2554 2553 403444 ReadFile 2551->2553 2552 403444 ReadFile 2552->2556 2553->2548 2554->2548 2555 403444 ReadFile 2554->2555 2557 405f96 WriteFile 2554->2557 2555->2554 2556->2548 2556->2552 2558 403332 GetTickCount 2556->2558 2559 403357 MulDiv wsprintfW 2556->2559 2581 405f96 WriteFile 2556->2581 2557->2554 2558->2556 2570 405456 2559->2570 2584 405f67 ReadFile 2562->2584 2565->2375 2567 40683c PeekMessageW 2566->2567 2568 406832 DispatchMessageW 2567->2568 2569 402fe0 2567->2569 2568->2567 2569->2366 2571 405471 2570->2571 2580 405513 2570->2580 2572 40548d lstrlenW 2571->2572 2573 40642b 17 API calls 2571->2573 2574 4054b6 2572->2574 2575 40549b lstrlenW 2572->2575 2573->2572 2577 4054c9 2574->2577 2578 4054bc SetWindowTextW 2574->2578 2576 4054ad lstrcatW 2575->2576 2575->2580 2576->2574 2579 4054cf SendMessageW SendMessageW SendMessageW 2577->2579 2577->2580 2578->2577 2579->2580 2580->2556 2582 405fb4 2581->2582 2582->2556 2583->2543 2585 403457 2584->2585 2585->2368 2587 403da7 2586->2587 2608 406335 wsprintfW 2587->2608 2589 403e18 2609 403e4c 2589->2609 2591 403e1d 2592 403b48 2591->2592 2593 40642b 17 API calls 2591->2593 2592->2396 2593->2591 2594->2392 2612 40625b 2595->2612 2598 4062f0 RegQueryValueExW RegCloseKey 2599 403b19 2598->2599 2599->2391 2599->2393 2600->2397 2616 404390 2601->2616 2603 40554c 2607 405573 2603->2607 2619 401389 2603->2619 2604 404390 SendMessageW 2605 405585 OleUninitialize 2604->2605 2605->2427 2607->2604 2608->2589 2610 40642b 17 API calls 2609->2610 2611 403e5a SetWindowTextW 2610->2611 2611->2591 2613 40626a 2612->2613 2614 406273 RegOpenKeyExW 2613->2614 2615 40626e 2613->2615 2614->2615 2615->2598 2615->2599 2617 4043a8 2616->2617 2618 404399 SendMessageW 2616->2618 2617->2603 2618->2617 2621 401390 2619->2621 2620 4013fe 2620->2603 2621->2620 2622 4013cb MulDiv SendMessageW 2621->2622 2622->2621 2623->2461 2624->2461 2625->2450 2627 406090 GetShortPathNameW 2626->2627 2628 40606a 2626->2628 2630 4060a5 2627->2630 2631 4061af 2627->2631 2653 405ee4 GetFileAttributesW CreateFileW 2628->2653 2630->2631 2633 4060ad wsprintfA 2630->2633 2631->2466 2632 406074 CloseHandle GetShortPathNameW 2632->2631 2634 406088 2632->2634 2635 40642b 17 API calls 2633->2635 2634->2627 2634->2631 2636 4060d5 2635->2636 2654 405ee4 GetFileAttributesW CreateFileW 2636->2654 2638 4060e2 2638->2631 2639 4060f1 GetFileSize GlobalAlloc 2638->2639 2640 406113 2639->2640 2641 4061a8 CloseHandle 2639->2641 2642 405f67 ReadFile 2640->2642 2641->2631 2643 40611b 2642->2643 2643->2641 2655 405e49 lstrlenA 2643->2655 2646 406132 lstrcpyA 2649 406154 2646->2649 2647 406146 2648 405e49 4 API calls 2647->2648 2648->2649 2650 40618b SetFilePointer 2649->2650 2651 405f96 WriteFile 2650->2651 2652 4061a1 GlobalFree 2651->2652 2652->2641 2653->2632 2654->2638 2656 405e8a lstrlenA 2655->2656 2657 405e92 2656->2657 2658 405e63 lstrcmpiA 2656->2658 2657->2646 2657->2647 2658->2657 2659 405e81 CharNextA 2658->2659 2659->2656 2660->2475 2662 405d8b 2661->2662 2663 405d9d 2661->2663 2662->2663 2664 405d98 CharNextW 2662->2664 2665 405cf0 CharNextW 2663->2665 2666 405dc1 2663->2666 2664->2666 2665->2663 2666->2478 2666->2479 2668 406762 FindClose 2667->2668 2669 40676d 2667->2669 2668->2669 2669->2485 2671 403a36 2670->2671 2672 403a00 2671->2672 2673 403a3b FreeLibrary GlobalFree 2671->2673 2674 405b00 2672->2674 2673->2672 2673->2673 2675 405dcb 18 API calls 2674->2675 2676 405b20 2675->2676 2677 405b28 DeleteFileW 2676->2677 2678 405b3f 2676->2678 2679 403816 OleUninitialize 2677->2679 2680 405c5f 2678->2680 2713 4063ee lstrcpynW 2678->2713 2679->2283 2679->2284 2680->2679 2685 40674c 2 API calls 2680->2685 2682 405b65 2683 405b78 2682->2683 2684 405b6b lstrcatW 2682->2684 2687 405d0f 2 API calls 2683->2687 2686 405b7e 2684->2686 2689 405c84 2685->2689 2688 405b8e lstrcatW 2686->2688 2690 405b99 lstrlenW FindFirstFileW 2686->2690 2687->2686 2688->2690 2689->2679 2691 405c88 2689->2691 2690->2680 2698 405bbb 2690->2698 2692 405cc3 3 API calls 2691->2692 2693 405c8e 2692->2693 2695 405ab8 5 API calls 2693->2695 2694 405c42 FindNextFileW 2694->2698 2699 405c58 FindClose 2694->2699 2697 405c9a 2695->2697 2700 405cb4 2697->2700 2701 405c9e 2697->2701 2698->2694 2702 405c0c 2698->2702 2706 405b00 60 API calls 2698->2706 2714 4063ee lstrcpynW 2698->2714 2699->2680 2703 405456 24 API calls 2700->2703 2701->2679 2705 405456 24 API calls 2701->2705 2702->2694 2708 405456 24 API calls 2702->2708 2710 405456 24 API calls 2702->2710 2712 4061b4 36 API calls 2702->2712 2715 405ab8 2702->2715 2703->2679 2707 405cab 2705->2707 2706->2702 2709 4061b4 36 API calls 2707->2709 2708->2694 2711 405cb2 2709->2711 2710->2702 2711->2679 2712->2702 2713->2682 2714->2698 2723 405ebf GetFileAttributesW 2715->2723 2718 405ae5 2718->2702 2719 405ad3 RemoveDirectoryW 2721 405ae1 2719->2721 2720 405adb DeleteFileW 2720->2721 2721->2718 2722 405af1 SetFileAttributesW 2721->2722 2722->2718 2724 405ed1 SetFileAttributesW 2723->2724 2725 405ac4 2723->2725 2724->2725 2725->2718 2725->2719 2725->2720 3008 6fed2349 3009 6fed23b3 3008->3009 3010 6fed23be GlobalAlloc 3009->3010 3011 6fed23dd 3009->3011 3010->3009 2894 403e6b 2895 403e83 2894->2895 2896 403fbe 2894->2896 2895->2896 2897 403e8f 2895->2897 2898 40400f 2896->2898 2899 403fcf GetDlgItem GetDlgItem 2896->2899 2901 403e9a SetWindowPos 2897->2901 2902 403ead 2897->2902 2900 404069 2898->2900 2908 401389 2 API calls 2898->2908 2903 404344 18 API calls 2899->2903 2904 404390 SendMessageW 2900->2904 2927 403fb9 2900->2927 2901->2902 2905 403eb2 ShowWindow 2902->2905 2906 403eca 2902->2906 2907 403ff9 SetClassLongW 2903->2907 2924 40407b 2904->2924 2905->2906 2909 403ed2 DestroyWindow 2906->2909 2910 403eec 2906->2910 2911 40140b 2 API calls 2907->2911 2914 404041 2908->2914 2964 4042cd 2909->2964 2912 403ef1 SetWindowLongW 2910->2912 2913 403f02 2910->2913 2911->2898 2912->2927 2915 403fab 2913->2915 2916 403f0e GetDlgItem 2913->2916 2914->2900 2917 404045 SendMessageW 2914->2917 2974 4043ab 2915->2974 2920 403f21 SendMessageW IsWindowEnabled 2916->2920 2921 403f3e 2916->2921 2917->2927 2918 40140b 2 API calls 2918->2924 2919 4042cf DestroyWindow EndDialog 2919->2964 2920->2921 2920->2927 2926 403f43 2921->2926 2928 403f4b 2921->2928 2930 403f92 SendMessageW 2921->2930 2931 403f5e 2921->2931 2923 4042fe ShowWindow 2923->2927 2924->2918 2924->2919 2925 40642b 17 API calls 2924->2925 2924->2927 2935 404344 18 API calls 2924->2935 2955 40420f DestroyWindow 2924->2955 2965 404344 2924->2965 2925->2924 2971 40431d 2926->2971 2928->2926 2928->2930 2930->2915 2933 403f66 2931->2933 2934 403f7b 2931->2934 2932 403f79 2932->2915 2937 40140b 2 API calls 2933->2937 2936 40140b 2 API calls 2934->2936 2935->2924 2938 403f82 2936->2938 2937->2926 2938->2915 2938->2926 2940 4040f6 GetDlgItem 2941 404113 ShowWindow KiUserCallbackDispatcher 2940->2941 2942 40410b 2940->2942 2968 404366 KiUserCallbackDispatcher 2941->2968 2942->2941 2944 40413d EnableWindow 2949 404151 2944->2949 2945 404156 GetSystemMenu EnableMenuItem SendMessageW 2946 404186 SendMessageW 2945->2946 2945->2949 2946->2949 2948 403e4c 18 API calls 2948->2949 2949->2945 2949->2948 2969 404379 SendMessageW 2949->2969 2970 4063ee lstrcpynW 2949->2970 2951 4041b5 lstrlenW 2952 40642b 17 API calls 2951->2952 2953 4041cb SetWindowTextW 2952->2953 2954 401389 2 API calls 2953->2954 2954->2924 2956 404229 CreateDialogParamW 2955->2956 2955->2964 2957 40425c 2956->2957 2956->2964 2958 404344 18 API calls 2957->2958 2959 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2958->2959 2960 401389 2 API calls 2959->2960 2961 4042ad 2960->2961 2961->2927 2962 4042b5 ShowWindow 2961->2962 2963 404390 SendMessageW 2962->2963 2963->2964 2964->2923 2964->2927 2966 40642b 17 API calls 2965->2966 2967 40434f SetDlgItemTextW 2966->2967 2967->2940 2968->2944 2969->2949 2970->2951 2972 404324 2971->2972 2973 40432a SendMessageW 2971->2973 2972->2973 2973->2932 2975 4043c3 GetWindowLongW 2974->2975 2976 40446e 2974->2976 2975->2976 2977 4043d8 2975->2977 2976->2927 2977->2976 2978 404405 GetSysColor 2977->2978 2979 404408 2977->2979 2978->2979 2980 404418 SetBkMode 2979->2980 2981 40440e SetTextColor 2979->2981 2982 404430 GetSysColor 2980->2982 2983 404436 2980->2983 2981->2980 2982->2983 2984 404447 2983->2984 2985 40443d SetBkColor 2983->2985 2984->2976 2986 404461 CreateBrushIndirect 2984->2986 2987 40445a DeleteObject 2984->2987 2985->2984 2986->2976 2987->2986 3055 402f2b 3056 402f56 3055->3056 3057 402f3d SetTimer 3055->3057 3058 402fab 3056->3058 3059 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3056->3059 3057->3056 3059->3058 3060 6fed10e1 3069 6fed1111 3060->3069 3061 6fed11d8 GlobalFree 3062 6fed12ba 2 API calls 3062->3069 3063 6fed11d3 3063->3061 3064 6fed1272 2 API calls 3067 6fed11c4 GlobalFree 3064->3067 3065 6fed1164 GlobalAlloc 3065->3069 3066 6fed11f8 GlobalFree 3066->3069 3067->3069 3068 6fed12e1 lstrcpyW 3068->3069 3069->3061 3069->3062 3069->3063 3069->3064 3069->3065 3069->3066 3069->3067 3069->3068 3070 6fed1000 3071 6fed101b 5 API calls 3070->3071 3072 6fed1019 3071->3072 3073 6fed2ca3 3074 6fed2cbb 3073->3074 3075 6fed158f 2 API calls 3074->3075 3076 6fed2cd6 3075->3076 2998 6fed103d 3001 6fed101b 2998->3001 3002 6fed1516 GlobalFree 3001->3002 3003 6fed1020 3002->3003 3004 6fed1024 3003->3004 3005 6fed1027 GlobalAlloc 3003->3005 3006 6fed153d 3 API calls 3004->3006 3005->3004 3007 6fed103b 3006->3007 2726 6fed29df 2727 6fed2a2f 2726->2727 2728 6fed29ef VirtualProtect 2726->2728 2728->2727 3012 6fed18d9 3014 6fed18fc 3012->3014 3013 6fed1943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3016 6fed1272 2 API calls 3013->3016 3014->3013 3015 6fed1931 GlobalFree 3014->3015 3015->3013 3017 6fed1ace GlobalFree GlobalFree 3016->3017 3018 6fed1058 3020 6fed1074 3018->3020 3019 6fed10dd 3020->3019 3021 6fed1092 3020->3021 3022 6fed1516 GlobalFree 3020->3022 3023 6fed1516 GlobalFree 3021->3023 3022->3021 3024 6fed10a2 3023->3024 3025 6fed10a9 GlobalSize 3024->3025 3026 6fed10b2 3024->3026 3025->3026 3027 6fed10c7 3026->3027 3028 6fed10b6 GlobalAlloc 3026->3028 3030 6fed10d2 GlobalFree 3027->3030 3029 6fed153d 3 API calls 3028->3029 3029->3027 3030->3019 3031 6fed16d4 3032 6fed1703 3031->3032 3033 6fed1b5f 22 API calls 3032->3033 3034 6fed170a 3033->3034 3035 6fed171d 3034->3035 3036 6fed1711 3034->3036 3038 6fed1744 3035->3038 3039 6fed1727 3035->3039 3037 6fed1272 2 API calls 3036->3037 3047 6fed171b 3037->3047 3040 6fed176e 3038->3040 3041 6fed174a 3038->3041 3042 6fed153d 3 API calls 3039->3042 3044 6fed153d 3 API calls 3040->3044 3043 6fed15b4 3 API calls 3041->3043 3045 6fed172c 3042->3045 3046 6fed174f 3043->3046 3044->3047 3048 6fed15b4 3 API calls 3045->3048 3049 6fed1272 2 API calls 3046->3049 3050 6fed1732 3048->3050 3051 6fed1755 GlobalFree 3049->3051 3052 6fed1272 2 API calls 3050->3052 3051->3047 3054 6fed1769 GlobalFree 3051->3054 3053 6fed1738 GlobalFree 3052->3053 3053->3047 3054->3047 2729 6fed1777 2730 6fed17aa 2729->2730 2771 6fed1b5f 2730->2771 2732 6fed17b1 2733 6fed18d6 2732->2733 2734 6fed17c9 2732->2734 2735 6fed17c2 2732->2735 2805 6fed23e0 2734->2805 2821 6fed239e 2735->2821 2740 6fed182d 2744 6fed187e 2740->2744 2745 6fed1833 2740->2745 2741 6fed180f 2834 6fed25b5 2741->2834 2742 6fed17df 2747 6fed17e5 2742->2747 2748 6fed17f0 2742->2748 2743 6fed17f8 2760 6fed17ee 2743->2760 2831 6fed2d83 2743->2831 2752 6fed25b5 10 API calls 2744->2752 2853 6fed15c6 2745->2853 2747->2760 2815 6fed2af8 2747->2815 2825 6fed2770 2748->2825 2761 6fed186f 2752->2761 2753 6fed1815 2845 6fed15b4 2753->2845 2758 6fed17f6 2758->2760 2759 6fed25b5 10 API calls 2759->2761 2760->2740 2760->2741 2763 6fed18c5 2761->2763 2859 6fed2578 2761->2859 2763->2733 2765 6fed18cf GlobalFree 2763->2765 2765->2733 2768 6fed18b1 2768->2763 2863 6fed153d wsprintfW 2768->2863 2769 6fed18aa FreeLibrary 2769->2768 2866 6fed121b GlobalAlloc 2771->2866 2773 6fed1b86 2867 6fed121b GlobalAlloc 2773->2867 2775 6fed1dcb GlobalFree GlobalFree GlobalFree 2776 6fed1de8 2775->2776 2792 6fed1e32 2775->2792 2778 6fed21de 2776->2778 2786 6fed1dfd 2776->2786 2776->2792 2777 6fed1c86 GlobalAlloc 2795 6fed1b91 2777->2795 2779 6fed2200 GetModuleHandleW 2778->2779 2778->2792 2780 6fed2226 2779->2780 2781 6fed2211 LoadLibraryW 2779->2781 2874 6fed161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2780->2874 2781->2780 2781->2792 2782 6fed1cd1 lstrcpyW 2785 6fed1cdb lstrcpyW 2782->2785 2783 6fed1cef GlobalFree 2783->2795 2785->2795 2786->2792 2870 6fed122c 2786->2870 2787 6fed2278 2791 6fed2285 lstrlenW 2787->2791 2787->2792 2788 6fed2086 2873 6fed121b GlobalAlloc 2788->2873 2875 6fed161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2791->2875 2792->2732 2793 6fed2238 2793->2787 2803 6fed2262 GetProcAddress 2793->2803 2795->2775 2795->2777 2795->2782 2795->2783 2795->2785 2795->2788 2795->2792 2796 6fed1fc7 GlobalFree 2795->2796 2797 6fed210e 2795->2797 2798 6fed1d2d 2795->2798 2800 6fed122c 2 API calls 2795->2800 2796->2795 2797->2792 2802 6fed2176 lstrcpyW 2797->2802 2798->2795 2868 6fed158f GlobalSize GlobalAlloc 2798->2868 2799 6fed229f 2799->2792 2800->2795 2802->2792 2803->2787 2804 6fed208f 2804->2732 2812 6fed23f8 2805->2812 2806 6fed122c GlobalAlloc lstrcpynW 2806->2812 2808 6fed2521 GlobalFree 2811 6fed17cf 2808->2811 2808->2812 2809 6fed24cb GlobalAlloc CLSIDFromString 2809->2808 2810 6fed24a0 GlobalAlloc WideCharToMultiByte 2810->2808 2811->2742 2811->2743 2811->2760 2812->2806 2812->2808 2812->2809 2812->2810 2814 6fed24ea 2812->2814 2877 6fed12ba 2812->2877 2814->2808 2881 6fed2704 2814->2881 2817 6fed2b0a 2815->2817 2816 6fed2baf VirtualAlloc 2818 6fed2bcd 2816->2818 2817->2816 2884 6fed2aa2 2818->2884 2820 6fed2c99 2820->2760 2822 6fed23b3 2821->2822 2823 6fed23be GlobalAlloc 2822->2823 2824 6fed17c8 2822->2824 2823->2822 2824->2734 2829 6fed27a0 2825->2829 2826 6fed284e 2828 6fed2854 GlobalSize 2826->2828 2830 6fed285e 2826->2830 2827 6fed283b GlobalAlloc 2827->2830 2828->2830 2829->2826 2829->2827 2830->2758 2833 6fed2d8e 2831->2833 2832 6fed2dce GlobalFree 2833->2832 2888 6fed121b GlobalAlloc 2834->2888 2836 6fed2638 MultiByteToWideChar 2841 6fed25bf 2836->2841 2837 6fed266b lstrcpynW 2837->2841 2838 6fed265a StringFromGUID2 2838->2841 2839 6fed26a2 GlobalFree 2839->2841 2840 6fed267e wsprintfW 2840->2841 2841->2836 2841->2837 2841->2838 2841->2839 2841->2840 2842 6fed26d7 GlobalFree 2841->2842 2843 6fed1272 2 API calls 2841->2843 2889 6fed12e1 2841->2889 2842->2753 2843->2841 2893 6fed121b GlobalAlloc 2845->2893 2847 6fed15b9 2848 6fed15c6 2 API calls 2847->2848 2849 6fed15c3 2848->2849 2850 6fed1272 2849->2850 2851 6fed127b GlobalAlloc lstrcpynW 2850->2851 2852 6fed12b5 GlobalFree 2850->2852 2851->2852 2852->2761 2854 6fed15ff lstrcpyW 2853->2854 2855 6fed15d2 wsprintfW 2853->2855 2858 6fed1618 2854->2858 2855->2858 2858->2759 2860 6fed2586 2859->2860 2862 6fed1891 2859->2862 2861 6fed25a2 GlobalFree 2860->2861 2860->2862 2861->2860 2862->2768 2862->2769 2864 6fed1272 2 API calls 2863->2864 2865 6fed155e 2864->2865 2865->2763 2866->2773 2867->2795 2869 6fed15ad 2868->2869 2869->2798 2876 6fed121b GlobalAlloc 2870->2876 2872 6fed123b lstrcpynW 2872->2792 2873->2804 2874->2793 2875->2799 2876->2872 2878 6fed12c1 2877->2878 2879 6fed122c 2 API calls 2878->2879 2880 6fed12df 2879->2880 2880->2812 2882 6fed2768 2881->2882 2883 6fed2712 VirtualAlloc 2881->2883 2882->2814 2883->2882 2885 6fed2aad 2884->2885 2886 6fed2abd 2885->2886 2887 6fed2ab2 GetLastError 2885->2887 2886->2820 2887->2886 2888->2841 2890 6fed130c 2889->2890 2891 6fed12ea 2889->2891 2890->2841 2891->2890 2892 6fed12f0 lstrcpyW 2891->2892 2892->2890 2893->2847

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 8 4034eb 1->8 3 4034f7-40350b call 406773 lstrlenA 2->3 9 40350d-403529 call 4067e3 * 3 3->9 8->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 22 403533 17->22 22->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 31 4035d2-4035d6 28->31 32 4035cb-4035d0 28->32 36 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->36 37 403746-403760 DeleteFileW call 403015 29->37 34 4035d8-4035dc 31->34 35 4035dd-4035e1 31->35 32->31 32->32 34->35 38 4036a0-4036ad call 405cf0 35->38 39 4035e7-4035ed 35->39 36->37 54 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 36->54 57 403811-403821 call 4039e3 OleUninitialize 37->57 58 403766-40376c 37->58 55 4036b1-4036b7 38->55 56 4036af-4036b0 38->56 43 403608-403641 39->43 44 4035ef-4035f7 39->44 45 403643-403648 43->45 46 40365e-403698 43->46 50 4035f9-4035fc 44->50 51 4035fe 44->51 45->46 52 40364a-403652 45->52 46->38 53 40369a-40369e 46->53 50->43 50->51 51->43 60 403654-403657 52->60 61 403659 52->61 53->38 62 4036bf-4036cd call 4063ee 53->62 54->37 54->57 55->28 64 4036bd 55->64 56->55 75 403947-40394d 57->75 76 403827-403837 call 405a54 ExitProcess 57->76 65 403801-403808 call 403abd 58->65 66 403772-40377d call 405cf0 58->66 60->46 60->61 61->46 70 4036d2 62->70 64->70 74 40380d 65->74 77 4037cb-4037d5 66->77 78 40377f-4037b4 66->78 70->29 74->57 80 4039cb-4039d3 75->80 81 40394f-403965 GetCurrentProcess OpenProcessToken 75->81 85 4037d7-4037e5 call 405dcb 77->85 86 40383d-403851 call 4059bf lstrcatW 77->86 82 4037b6-4037ba 78->82 83 4039d5 80->83 84 4039d9-4039dd ExitProcess 80->84 88 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 40399b-4039a9 call 4067e3 81->89 90 4037c3-4037c7 82->90 91 4037bc-4037c1 82->91 83->84 85->57 99 4037e7-4037fd call 4063ee * 2 85->99 100 403853-403859 lstrcatW 86->100 101 40385e-403878 lstrcatW lstrcmpiW 86->101 88->89 102 4039b7-4039c2 ExitWindowsEx 89->102 103 4039ab-4039b5 89->103 90->82 95 4037c9 90->95 91->90 91->95 95->77 99->65 100->101 101->57 106 40387a-40387d 101->106 102->80 104 4039c4-4039c6 call 40140b 102->104 103->102 103->104 104->80 110 403886 call 4059a2 106->110 111 40387f call 405925 106->111 116 40388b-403899 SetCurrentDirectoryW 110->116 115 403884 111->115 115->116 118 4038a6-4038cf call 4063ee 116->118 119 40389b-4038a1 call 4063ee 116->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 128 40393b-403942 call 4061b4 126->128 127->126 129 403904-40391d call 4061b4 call 40642b call 4059d7 127->129 128->57 137 403922-403924 129->137 137->126 138 403926-40392d CloseHandle 137->138 138->126
                                APIs
                                • SetErrorMode.KERNELBASE ref: 004034C5
                                • GetVersion.KERNEL32 ref: 004034CB
                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                                • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                                • OleInitialize.OLE32(00000000), ref: 00403542
                                • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                                • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PO.exe",00000020,"C:\Users\user\Desktop\PO.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                                • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                                • ExitProcess.KERNEL32 ref: 00403837
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                                • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\PO.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                                • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                                • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                                • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                                • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                                • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                                • ExitProcess.KERNEL32 ref: 004039DD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                • String ID: "C:\Users\user\Desktop\PO.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\PO.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                • API String ID: 3441113951-142698326
                                • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                                • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                                • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 385 405b00-405b26 call 405dcb 388 405b28-405b3a DeleteFileW 385->388 389 405b3f-405b46 385->389 390 405cbc-405cc0 388->390 391 405b48-405b4a 389->391 392 405b59-405b69 call 4063ee 389->392 393 405b50-405b53 391->393 394 405c6a-405c6f 391->394 400 405b78-405b79 call 405d0f 392->400 401 405b6b-405b76 lstrcatW 392->401 393->392 393->394 394->390 397 405c71-405c74 394->397 398 405c76-405c7c 397->398 399 405c7e-405c86 call 40674c 397->399 398->390 399->390 409 405c88-405c9c call 405cc3 call 405ab8 399->409 403 405b7e-405b82 400->403 401->403 405 405b84-405b8c 403->405 406 405b8e-405b94 lstrcatW 403->406 405->406 408 405b99-405bb5 lstrlenW FindFirstFileW 405->408 406->408 410 405bbb-405bc3 408->410 411 405c5f-405c63 408->411 425 405cb4-405cb7 call 405456 409->425 426 405c9e-405ca1 409->426 413 405be3-405bf7 call 4063ee 410->413 414 405bc5-405bcd 410->414 411->394 416 405c65 411->416 427 405bf9-405c01 413->427 428 405c0e-405c19 call 405ab8 413->428 417 405c42-405c52 FindNextFileW 414->417 418 405bcf-405bd7 414->418 416->394 417->410 424 405c58-405c59 FindClose 417->424 418->413 421 405bd9-405be1 418->421 421->413 421->417 424->411 425->390 426->398 430 405ca3-405cb2 call 405456 call 4061b4 426->430 427->417 431 405c03-405c07 call 405b00 427->431 436 405c3a-405c3d call 405456 428->436 437 405c1b-405c1e 428->437 430->390 439 405c0c 431->439 436->417 440 405c20-405c30 call 405456 call 4061b4 437->440 441 405c32-405c38 437->441 439->417 440->417 441->417
                                APIs
                                • DeleteFileW.KERNELBASE(?,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                                • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                                • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                                • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                                • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                                • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                                • FindClose.KERNEL32(00000000), ref: 00405C59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                                • API String ID: 2035342205-1262657124
                                • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                                • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                                • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                                APIs
                                • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                                • FindClose.KERNEL32(00000000), ref: 00406763
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID: C:\
                                • API String ID: 2295610775-3404278061
                                • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                                • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 147 403e9a-403ea7 SetWindowPos 142->147 148 403ead-403eb0 142->148 145 404071-404076 call 404390 143->145 146 404033-404036 143->146 144->143 158 40407b-404096 145->158 150 404038-404043 call 401389 146->150 151 404069-40406b 146->151 147->148 153 403eb2-403ec4 ShowWindow 148->153 154 403eca-403ed0 148->154 150->151 172 404045-404064 SendMessageW 150->172 151->145 157 404311 151->157 153->154 159 403ed2-403ee7 DestroyWindow 154->159 160 403eec-403eef 154->160 162 404313-40431a 157->162 168 404098-40409a call 40140b 158->168 169 40409f-4040a5 158->169 163 4042ee-4042f4 159->163 165 403ef1-403efd SetWindowLongW 160->165 166 403f02-403f08 160->166 163->157 174 4042f6-4042fc 163->174 165->162 170 403fab-403fb9 call 4043ab 166->170 171 403f0e-403f1f GetDlgItem 166->171 168->169 175 4040ab-4040b6 169->175 176 4042cf-4042e8 DestroyWindow EndDialog 169->176 170->162 177 403f21-403f38 SendMessageW IsWindowEnabled 171->177 178 403f3e-403f41 171->178 172->162 174->157 180 4042fe-404307 ShowWindow 174->180 175->176 181 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 175->181 176->163 177->157 177->178 183 403f43-403f44 178->183 184 403f46-403f49 178->184 180->157 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 181->209 210 40410b-404110 181->210 187 403f74-403f79 call 40431d 183->187 188 403f57-403f5c 184->188 189 403f4b-403f51 184->189 187->170 192 403f92-403fa5 SendMessageW 188->192 194 403f5e-403f64 188->194 189->192 193 403f53-403f55 189->193 192->170 193->187 197 403f66-403f6c call 40140b 194->197 198 403f7b-403f84 call 40140b 194->198 207 403f72 197->207 198->170 206 403f86-403f90 198->206 206->207 207->187 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->158 229 4041e4-4041e6 218->229 229->158 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->157 234 4041fe-404204 231->234 232->163 233 404229-404256 CreateDialogParamW 232->233 233->163 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 233->236 234->158 235 40420a 234->235 235->157 236->157 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->163
                                APIs
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                                • ShowWindow.USER32(?), ref: 00403EC4
                                • DestroyWindow.USER32 ref: 00403ED8
                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                                • GetDlgItem.USER32(?,?), ref: 00403F15
                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                                • IsWindowEnabled.USER32(00000000), ref: 00403F30
                                • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                                • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                                • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                                • GetDlgItem.USER32(?,00000003), ref: 004040F9
                                • ShowWindow.USER32(00000000,?), ref: 0040411A
                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                                • EnableWindow.USER32(?,?), ref: 00404147
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                                • EnableMenuItem.USER32(00000000), ref: 00404164
                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                                • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                                • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                                • ShowWindow.USER32(?,0000000A), ref: 00404301
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                • String ID:
                                • API String ID: 3282139019-0
                                • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                                • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                                • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 257 403b43-403b6c call 403d93 call 405dcb 247->257 253 403b22-403b33 call 4062bc 248->253 254 403b38-403b3e lstrcatW 248->254 253->254 254->257 262 403b72-403b77 257->262 263 403bfe-403c06 call 405dcb 257->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 269 403c14-403c39 LoadImageW 263->269 270 403c08-403c0f call 40642b 263->270 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 269->273 274 403c3b-403c6b RegisterClassW 269->274 270->269 275 403bbd-403bc9 lstrlenW 271->275 276 403bad-403bba call 405cf0 271->276 288 403cc4-403cc7 273->288 289 403ccc-403cd7 call 403d93 273->289 277 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->277 278 403d89 274->278 282 403bf1-403bf9 call 405cc3 call 4063ee 275->282 283 403bcb-403bd9 lstrcmpiW 275->283 276->275 277->273 281 403d8b-403d92 278->281 282->263 283->282 287 403bdb-403be5 GetFileAttributesW 283->287 292 403be7-403be9 287->292 293 403beb-403bec call 405d0f 287->293 288->281 297 403d60-403d68 call 405529 289->297 298 403cdd-403cf7 ShowWindow call 406773 289->298 292->282 292->293 293->282 303 403d82-403d84 call 40140b 297->303 304 403d6a-403d70 297->304 305 403d03-403d15 GetClassInfoW 298->305 306 403cf9-403cfe call 406773 298->306 303->278 304->288 307 403d76-403d7d call 40140b 304->307 310 403d17-403d27 GetClassInfoW RegisterClassW 305->310 311 403d2d-403d50 DialogBoxParamW call 40140b 305->311 306->305 307->288 310->311 315 403d55-403d5e call 403a0d 311->315 315->281
                                APIs
                                  • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                  • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",00000000), ref: 00403B3E
                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75573420), ref: 00403BBE
                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                                • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                                  • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                                • RegisterClassW.USER32(007A7A00), ref: 00403C62
                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                                • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                                • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                                • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                                • RegisterClassW.USER32(007A7A00), ref: 00403D27
                                • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                • String ID: "C:\Users\user\Desktop\PO.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                • API String ID: 1975747703-637729801
                                • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                                • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                                • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 323 403245-403249 321->323 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 333 4030a8-4030bf 330->333 338 403198-40319b 331->338 339 4031eb-4031f0 331->339 335 4030c1 333->335 336 4030c3-4030cc call 403444 333->336 335->336 343 4031f2-4031fa call 402fb1 336->343 344 4030d2-4030d9 336->344 341 40319d-4031b5 call 40345a call 403444 338->341 342 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 338->342 339->323 341->339 365 4031b7-4031bd 341->365 342->339 369 4031fc-40320d 342->369 343->339 347 403155-403159 344->347 348 4030db-4030ef call 405e9f 344->348 352 403163-403169 347->352 353 40315b-403162 call 402fb1 347->353 348->352 367 4030f1-4030f8 348->367 360 403178-403180 352->360 361 40316b-403175 call 4068d0 352->361 353->352 360->333 368 403186 360->368 361->360 365->339 365->342 367->352 371 4030fa-403101 367->371 368->331 372 403215-40321a 369->372 373 40320f 369->373 371->352 374 403103-40310a 371->374 375 40321b-403221 372->375 373->372 374->352 377 40310c-403113 374->377 375->375 376 403223-40323e SetFilePointer call 405e9f 375->376 380 403243 376->380 377->352 379 403115-403135 377->379 379->339 381 40313b-40313f 379->381 380->323 382 403141-403145 381->382 383 403147-40314f 381->383 382->368 382->383 383->352 384 403151-403153 383->384 384->352
                                APIs
                                • GetTickCount.KERNEL32 ref: 00403026
                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                                • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PO.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                • API String ID: 2803837635-125019182
                                • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                                • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                                • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 449 40642b-406436 450 406438-406447 449->450 451 406449-40645f 449->451 450->451 452 406465-406472 451->452 453 406677-40667d 451->453 452->453 456 406478-40647f 452->456 454 406683-40668e 453->454 455 406484-406491 453->455 458 406690-406694 call 4063ee 454->458 459 406699-40669a 454->459 455->454 457 406497-4064a3 455->457 456->453 460 406664 457->460 461 4064a9-4064e7 457->461 458->459 465 406672-406675 460->465 466 406666-406670 460->466 463 406607-40660b 461->463 464 4064ed-4064f8 461->464 469 40660d-406613 463->469 470 40663e-406642 463->470 467 406511 464->467 468 4064fa-4064ff 464->468 465->453 466->453 474 406518-40651f 467->474 468->467 471 406501-406504 468->471 472 406623-40662f call 4063ee 469->472 473 406615-406621 call 406335 469->473 475 406651-406662 lstrlenW 470->475 476 406644-40664c call 40642b 470->476 471->467 478 406506-406509 471->478 487 406634-40663a 472->487 473->487 480 406521-406523 474->480 481 406524-406526 474->481 475->453 476->475 478->467 483 40650b-40650f 478->483 480->481 485 406561-406564 481->485 486 406528-406546 call 4062bc 481->486 483->474 488 406574-406577 485->488 489 406566-406572 GetSystemDirectoryW 485->489 495 40654b-40654f 486->495 487->475 491 40663c 487->491 493 4065e2-4065e4 488->493 494 406579-406587 GetWindowsDirectoryW 488->494 492 4065e6-4065ea 489->492 496 4065ff-406605 call 40669d 491->496 492->496 501 4065ec 492->501 493->492 498 406589-406593 493->498 494->493 499 406555-40655c call 40642b 495->499 500 4065ef-4065f2 495->500 496->475 504 406595-406598 498->504 505 4065ad-4065c3 SHGetSpecialFolderLocation 498->505 499->492 500->496 502 4065f4-4065fa lstrcatW 500->502 501->500 502->496 504->505 508 40659a-4065a1 504->508 509 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 505->509 510 4065de 505->510 511 4065a9-4065ab 508->511 509->492 509->510 510->493 511->492 511->505
                                APIs
                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                                • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                                • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                                • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                                • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                                • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                • API String ID: 717251189-1230650788
                                • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                                • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                                • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 512 405456-40546b 513 405471-405482 512->513 514 405522-405526 512->514 515 405484-405488 call 40642b 513->515 516 40548d-405499 lstrlenW 513->516 515->516 518 4054b6-4054ba 516->518 519 40549b-4054ab lstrlenW 516->519 521 4054c9-4054cd 518->521 522 4054bc-4054c3 SetWindowTextW 518->522 519->514 520 4054ad-4054b1 lstrcatW 519->520 520->518 523 405513-405515 521->523 524 4054cf-405511 SendMessageW * 3 521->524 522->521 523->514 525 405517-40551a 523->525 524->523 525->514
                                APIs
                                • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,755723A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                                • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,755723A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                                • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,755723A0), ref: 004054B1
                                • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                • String ID:
                                • API String ID: 2531174081-0
                                • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                                • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                                • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 526 405925-405970 CreateDirectoryW 527 405972-405974 526->527 528 405976-405983 GetLastError 526->528 529 40599d-40599f 527->529 528->529 530 405985-405999 SetFileSecurityW 528->530 530->527 531 40599b GetLastError 530->531 531->529
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                                • GetLastError.KERNEL32 ref: 0040597C
                                • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                                • GetLastError.KERNEL32 ref: 0040599B
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                                • C:\Users\user\Desktop, xrefs: 00405925
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                • API String ID: 3449924974-1326413622
                                • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                                • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 532 406773-406793 GetSystemDirectoryW 533 406795 532->533 534 406797-406799 532->534 533->534 535 4067aa-4067ac 534->535 536 40679b-4067a4 534->536 538 4067ad-4067e0 wsprintfW LoadLibraryExW 535->538 536->535 537 4067a6-4067a8 536->537 537->538
                                APIs
                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                • wsprintfW.USER32 ref: 004067C5
                                • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                • String ID: %s%S.dll$UXTHEME$\
                                • API String ID: 2200240437-1946221925
                                • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                                • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 539 40324c-403263 540 403265 539->540 541 40326c-403275 539->541 540->541 542 403277 541->542 543 40327e-403283 541->543 542->543 544 403293-4032a0 call 403444 543->544 545 403285-40328e call 40345a 543->545 549 403432 544->549 550 4032a6-4032aa 544->550 545->544 551 403434-403435 549->551 552 4032b0-4032d6 GetTickCount 550->552 553 4033dd-4033df 550->553 554 40343d-403441 551->554 555 40343a 552->555 556 4032dc-4032e4 552->556 557 4033e1-4033e4 553->557 558 40341f-403422 553->558 555->554 559 4032e6 556->559 560 4032e9-4032f7 call 403444 556->560 557->555 563 4033e6 557->563 561 403424 558->561 562 403427-403430 call 403444 558->562 559->560 560->549 572 4032fd-403306 560->572 561->562 562->549 573 403437 562->573 564 4033e9-4033ef 563->564 567 4033f1 564->567 568 4033f3-403401 call 403444 564->568 567->568 568->549 576 403403-40340f call 405f96 568->576 575 40330c-40332c call 40693e 572->575 573->555 581 403332-403345 GetTickCount 575->581 582 4033d5-4033d7 575->582 583 403411-40341b 576->583 584 4033d9-4033db 576->584 585 403390-403392 581->585 586 403347-40334f 581->586 582->551 583->564 589 40341d 583->589 584->551 587 403394-403398 585->587 588 4033c9-4033cd 585->588 590 403351-403355 586->590 591 403357-403388 MulDiv wsprintfW call 405456 586->591 592 40339a-4033a1 call 405f96 587->592 593 4033af-4033ba 587->593 588->556 594 4033d3 588->594 589->555 590->585 590->591 598 40338d 591->598 599 4033a6-4033a8 592->599 597 4033bd-4033c1 593->597 594->555 597->575 600 4033c7 597->600 598->585 599->584 601 4033aa-4033ad 599->601 600->555 601->597
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CountTick$wsprintf
                                • String ID: ... %d%%
                                • API String ID: 551687249-2449383134
                                • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                                • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                                • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 602 405f13-405f1f 603 405f20-405f54 GetTickCount GetTempFileNameW 602->603 604 405f63-405f65 603->604 605 405f56-405f58 603->605 607 405f5d-405f60 604->607 605->603 606 405f5a 605->606 606->607
                                APIs
                                • GetTickCount.KERNEL32 ref: 00405F31
                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\PO.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CountFileNameTempTick
                                • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                • API String ID: 1716503409-979074613
                                • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                                • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 608 6fed1777-6fed17b6 call 6fed1b5f 612 6fed17bc-6fed17c0 608->612 613 6fed18d6-6fed18d8 608->613 614 6fed17c9-6fed17d6 call 6fed23e0 612->614 615 6fed17c2-6fed17c8 call 6fed239e 612->615 620 6fed17d8-6fed17dd 614->620 621 6fed1806-6fed180d 614->621 615->614 624 6fed17df-6fed17e0 620->624 625 6fed17f8-6fed17fb 620->625 622 6fed182d-6fed1831 621->622 623 6fed180f-6fed182b call 6fed25b5 call 6fed15b4 call 6fed1272 GlobalFree 621->623 626 6fed187e-6fed1884 call 6fed25b5 622->626 627 6fed1833-6fed187c call 6fed15c6 call 6fed25b5 622->627 649 6fed1885-6fed1889 623->649 630 6fed17e8-6fed17e9 call 6fed2af8 624->630 631 6fed17e2-6fed17e3 624->631 625->621 628 6fed17fd-6fed17fe call 6fed2d83 625->628 626->649 627->649 643 6fed1803 628->643 640 6fed17ee 630->640 632 6fed17e5-6fed17e6 631->632 633 6fed17f0-6fed17f6 call 6fed2770 631->633 632->621 632->630 648 6fed1805 633->648 640->643 643->648 648->621 652 6fed188b-6fed1899 call 6fed2578 649->652 653 6fed18c6-6fed18cd 649->653 658 6fed189b-6fed189e 652->658 659 6fed18b1-6fed18b8 652->659 653->613 655 6fed18cf-6fed18d0 GlobalFree 653->655 655->613 658->659 660 6fed18a0-6fed18a8 658->660 659->653 661 6fed18ba-6fed18c5 call 6fed153d 659->661 660->659 662 6fed18aa-6fed18ab FreeLibrary 660->662 661->653 662->659
                                APIs
                                  • Part of subcall function 6FED1B5F: GlobalFree.KERNEL32(?), ref: 6FED1DD4
                                  • Part of subcall function 6FED1B5F: GlobalFree.KERNEL32(?), ref: 6FED1DD9
                                  • Part of subcall function 6FED1B5F: GlobalFree.KERNEL32(?), ref: 6FED1DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6FED1825
                                • FreeLibrary.KERNEL32(?), ref: 6FED18AB
                                • GlobalFree.KERNEL32(00000000), ref: 6FED18D0
                                  • Part of subcall function 6FED239E: GlobalAlloc.KERNEL32(00000040,?), ref: 6FED23CF
                                  • Part of subcall function 6FED2770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6FED17F6,00000000), ref: 6FED2840
                                  • Part of subcall function 6FED15C6: wsprintfW.USER32 ref: 6FED15F4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc$Librarywsprintf
                                • String ID:
                                • API String ID: 3962662361-3916222277
                                • Opcode ID: ab0cdc20baf7b4a135183ee50df9feaca383426aa32e2ffeb3c7602b4b003cc9
                                • Instruction ID: 0041d961151d1354f802e59b0920c210a0c10aa9e797ae226f6e9fbb696a22b0
                                • Opcode Fuzzy Hash: ab0cdc20baf7b4a135183ee50df9feaca383426aa32e2ffeb3c7602b4b003cc9
                                • Instruction Fuzzy Hash: 1341D2754003059AEF10DFB4D984BC53FA9BF06329F34416AF9169EAC6DB7CA086C761

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 665 405dcb-405de6 call 4063ee call 405d6e 670 405de8-405dea 665->670 671 405dec-405df9 call 40669d 665->671 672 405e44-405e46 670->672 675 405e09-405e0d 671->675 676 405dfb-405e01 671->676 678 405e23-405e2c lstrlenW 675->678 676->670 677 405e03-405e07 676->677 677->670 677->675 679 405e2e-405e42 call 405cc3 GetFileAttributesW 678->679 680 405e0f-405e16 call 40674c 678->680 679->672 685 405e18-405e1b 680->685 686 405e1d-405e1e call 405d0f 680->686 685->670 685->686 686->678
                                APIs
                                  • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                                  • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                                  • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                                • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                                • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75573420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 3248276644-3077356548
                                • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                                • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                                • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 688 4062bc-4062ee call 40625b 691 4062f0-40631e RegQueryValueExW RegCloseKey 688->691 692 40632c 688->692 691->692 693 406320-406324 691->693 694 406330-406332 692->694 693->694 695 406326-40632a 693->695 695->692 695->694
                                APIs
                                • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                                • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CloseQueryValue
                                • String ID: Call
                                • API String ID: 3356406503-1824292864
                                • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                                • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 696 4059d7-405a08 CreateProcessW 697 405a16-405a17 696->697 698 405a0a-405a13 CloseHandle 696->698 698->697
                                APIs
                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                                • CloseHandle.KERNEL32(?), ref: 00405A0D
                                Strings
                                • Error launching installer, xrefs: 004059EA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CloseCreateHandleProcess
                                • String ID: Error launching installer
                                • API String ID: 3712363035-66219284
                                • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                                • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                                • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                                APIs
                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                                • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                                • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                                APIs
                                • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                                  • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                                  • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                                  • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                • String ID:
                                • API String ID: 2547128583-0
                                • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                                • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                                • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                                APIs
                                • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: File$AttributesCreate
                                • String ID:
                                • API String ID: 415043291-0
                                • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                APIs
                                • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                                • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CreateDirectoryErrorLast
                                • String ID:
                                • API String ID: 1375471231-0
                                • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                                • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                                APIs
                                • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: FileRead
                                • String ID:
                                • API String ID: 2738559852-0
                                • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                                • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                                APIs
                                • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                                APIs
                                • VirtualProtect.KERNELBASE(6FED505C,00000004,00000040,6FED504C), ref: 6FED29FD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID:
                                • API String ID: 544645111-0
                                • Opcode ID: 4e4916dab816ed556b9f633b69b9668870c3b53007c52a4f76016cbe071fd8cc
                                • Instruction ID: 53cf6b0af2ecf42067b91dad217aaa08d1b99ee67d71be04de57d0c3d909955d
                                • Opcode Fuzzy Hash: 4e4916dab816ed556b9f633b69b9668870c3b53007c52a4f76016cbe071fd8cc
                                • Instruction Fuzzy Hash: 0BF0C2B0904B80DECB50CF3CA4447093FE2FB1B325B60852AE288D6E40E3344465DB91
                                APIs
                                • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Open
                                • String ID:
                                • API String ID: 71445658-0
                                • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                                • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                                • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                                APIs
                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                                • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                                • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                                APIs
                                • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: FilePointer
                                • String ID:
                                • API String ID: 973152223-0
                                • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                APIs
                                • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                                • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                                • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                                APIs
                                • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CallbackDispatcherUser
                                • String ID:
                                • API String ID: 2492992576-0
                                • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                                • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                                • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                                APIs
                                • VirtualAlloc.KERNELBASE(00000000), ref: 6FED2BB7
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: d4ee432405c3c649eff9256a27f8945b820e669057d127603ceafa5b3e71cb56
                                • Instruction ID: e2d90521904b929d8547877318e4dab9e105db2d37769a0f9a32968635f2522b
                                • Opcode Fuzzy Hash: d4ee432405c3c649eff9256a27f8945b820e669057d127603ceafa5b3e71cb56
                                • Instruction Fuzzy Hash: B1418171804704DFDF24DFA8E984B597F76EB66368F30842AF404CAE50D734A9578B91
                                APIs
                                • GlobalAlloc.KERNELBASE(00000040,?,6FED123B,?,6FED12DF,00000019,6FED11BE,-000000A0), ref: 6FED1225
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: AllocGlobal
                                • String ID:
                                • API String ID: 3761449716-0
                                • Opcode ID: 3dc8f0f7c7aa1a527f2907322ca173f947e69b10cd7415a7e644a7b5f38d7f82
                                • Instruction ID: 1ba57615d79ca68972dcfeecee68e7c292fcf3042603df015ec7ae3246b06e80
                                • Opcode Fuzzy Hash: 3dc8f0f7c7aa1a527f2907322ca173f947e69b10cd7415a7e644a7b5f38d7f82
                                • Instruction Fuzzy Hash: 0EB01270A00500DFEF009B68DD46F343A55F703311F044001F600C0580C12048208935
                                APIs
                                  • Part of subcall function 6FED121B: GlobalAlloc.KERNELBASE(00000040,?,6FED123B,?,6FED12DF,00000019,6FED11BE,-000000A0), ref: 6FED1225
                                • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6FED1C8D
                                • lstrcpyW.KERNEL32(00000008,?), ref: 6FED1CD5
                                • lstrcpyW.KERNEL32(00000808,?), ref: 6FED1CDF
                                • GlobalFree.KERNEL32(00000000), ref: 6FED1CF2
                                • GlobalFree.KERNEL32(?), ref: 6FED1DD4
                                • GlobalFree.KERNEL32(?), ref: 6FED1DD9
                                • GlobalFree.KERNEL32(?), ref: 6FED1DDE
                                • GlobalFree.KERNEL32(00000000), ref: 6FED1FC8
                                • lstrcpyW.KERNEL32(?,?), ref: 6FED2182
                                • GetModuleHandleW.KERNEL32(00000008), ref: 6FED2201
                                • LoadLibraryW.KERNEL32(00000008), ref: 6FED2212
                                • GetProcAddress.KERNEL32(?,?), ref: 6FED226C
                                • lstrlenW.KERNEL32(00000808), ref: 6FED2286
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                • String ID:
                                • API String ID: 245916457-0
                                • Opcode ID: c53120b22f55282d3afe0da8a0c621f25e6057fd3e0a620b5b17be4e2c95a6da
                                • Instruction ID: 34a3e1dc7952550ad51dc40e277fcb4c9ca09d3d71bf900dc86875234c8e23ea
                                • Opcode Fuzzy Hash: c53120b22f55282d3afe0da8a0c621f25e6057fd3e0a620b5b17be4e2c95a6da
                                • Instruction Fuzzy Hash: F2227A71D04605DAEB108FE8CA806EDBFB5FF16319F30862EF165E6A80D77865838B51
                                APIs
                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                                • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                  • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                                • wsprintfA.USER32 ref: 004060B9
                                • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                                • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                                • GlobalFree.KERNEL32(00000000), ref: 004061A2
                                • CloseHandle.KERNEL32(00000000), ref: 004061A9
                                  • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                                  • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                • String ID: %ls=%ls$[Rename]$Uz$]z
                                • API String ID: 2171350718-2939442745
                                • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                                • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                                • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                                APIs
                                • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                                • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                                • CharNextW.USER32(?,00000000,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                                • CharPrevW.USER32(?,?,75573420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                                Strings
                                • "C:\Users\user\Desktop\PO.exe", xrefs: 0040669D
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                                • *?|<>/":, xrefs: 004066EF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Char$Next$Prev
                                • String ID: "C:\Users\user\Desktop\PO.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                • API String ID: 589700163-3284517277
                                • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                                • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                                • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                                APIs
                                • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                                • GetSysColor.USER32(00000000), ref: 00404406
                                • SetTextColor.GDI32(?,00000000), ref: 00404412
                                • SetBkMode.GDI32(?,?), ref: 0040441E
                                • GetSysColor.USER32(?), ref: 00404431
                                • SetBkColor.GDI32(?,?), ref: 00404441
                                • DeleteObject.GDI32(?), ref: 0040445B
                                • CreateBrushIndirect.GDI32(?), ref: 00404465
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                • String ID:
                                • API String ID: 2320649405-0
                                • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                                • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                                • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                                APIs
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FED2238,?,00000808), ref: 6FED1635
                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6FED2238,?,00000808), ref: 6FED163C
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FED2238,?,00000808), ref: 6FED1650
                                • GetProcAddress.KERNEL32(8"o,00000000), ref: 6FED1657
                                • GlobalFree.KERNEL32(00000000), ref: 6FED1660
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                • String ID: 8"o
                                • API String ID: 1148316912-781327480
                                • Opcode ID: fbfb4ece58a4cff4dcbfedfcb11fad814b76b30ccbe539bcacff7bad798a9208
                                • Instruction ID: e8294087522b29c574c68c6451a96a2147fcb073d34d94007455b96916535b60
                                • Opcode Fuzzy Hash: fbfb4ece58a4cff4dcbfedfcb11fad814b76b30ccbe539bcacff7bad798a9208
                                • Instruction Fuzzy Hash: F5F01C722065387BDA2117A69C4CC9BBE9DEF9B2F5B110212F628E21D086614C11DBF2
                                APIs
                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                                • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                                • wsprintfW.USER32 ref: 00402F84
                                • SetWindowTextW.USER32(?,?), ref: 00402F94
                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                                Strings
                                • verifying installer: %d%%, xrefs: 00402F7E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Text$ItemTimerWindowwsprintf
                                • String ID: verifying installer: %d%%
                                • API String ID: 1451636040-82062127
                                • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                                • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                                • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                                APIs
                                  • Part of subcall function 6FED121B: GlobalAlloc.KERNELBASE(00000040,?,6FED123B,?,6FED12DF,00000019,6FED11BE,-000000A0), ref: 6FED1225
                                • GlobalFree.KERNEL32(?), ref: 6FED26A3
                                • GlobalFree.KERNEL32(00000000), ref: 6FED26D8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: d66f7326f434a82e3ec24f709bafb3a5bc71eea5cf74f2bb26148811d47b0e92
                                • Instruction ID: 6f1ac9b77f12d60ed6e3e0002cab39e361ec0b962e6700e4ef184e2930e6bd1a
                                • Opcode Fuzzy Hash: d66f7326f434a82e3ec24f709bafb3a5bc71eea5cf74f2bb26148811d47b0e92
                                • Instruction Fuzzy Hash: B9319031508701EFDB159F68D984C2A7FB6FBA7314724466EF11187E90C732A817DB62
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: FreeGlobal
                                • String ID:
                                • API String ID: 2979337801-0
                                • Opcode ID: 62c31fd59a14721266fd9097f95e048380db7aeef43f4812a70c4b6f1fb16cac
                                • Instruction ID: d01ccfe21561ca759511a68a7b8f3d41edd830982a1036b28df654fc5d6edcb1
                                • Opcode Fuzzy Hash: 62c31fd59a14721266fd9097f95e048380db7aeef43f4812a70c4b6f1fb16cac
                                • Instruction Fuzzy Hash: 6851E331D042599ABB089FF886405ADBFB6EF4539CB30425BF410A7B50D779BE838791
                                APIs
                                • GlobalFree.KERNEL32(00000000), ref: 6FED2522
                                  • Part of subcall function 6FED122C: lstrcpynW.KERNEL32(00000000,?,6FED12DF,00000019,6FED11BE,-000000A0), ref: 6FED123C
                                • GlobalAlloc.KERNEL32(00000040), ref: 6FED24A8
                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FED24C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                • String ID:
                                • API String ID: 4216380887-0
                                • Opcode ID: 570afa3a76dbc131e3de361d7f9701e6f87766219bf039cb45e5dee465dc5933
                                • Instruction ID: d53ec1db57eccfea6d1c2302bca6ed4f4848054ae7f06e767ea6e04da2631996
                                • Opcode Fuzzy Hash: 570afa3a76dbc131e3de361d7f9701e6f87766219bf039cb45e5dee465dc5933
                                • Instruction Fuzzy Hash: A341C1B0448309DFD7149FB8D940A667FB9FFA6314B20891EF84586E81D734A547CB62
                                APIs
                                • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75573420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                                • CharNextW.USER32(00000000), ref: 00405D81
                                • CharNextW.USER32(00000000), ref: 00405D99
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CharNext
                                • String ID: C:\
                                • API String ID: 3213498283-3404278061
                                • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                                • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                                • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                                • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CharPrevlstrcatlstrlen
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 2659869361-4083868402
                                • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                                • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                                • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                                APIs
                                • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                                • GetTickCount.KERNEL32 ref: 00402FE2
                                • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                                • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                • String ID:
                                • API String ID: 2102729457-0
                                • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                                • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                                • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                                APIs
                                • FreeLibrary.KERNEL32(?,75573420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                                • GlobalFree.KERNEL32(009906A0), ref: 00403A49
                                Strings
                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: Free$GlobalLibrary
                                • String ID: C:\Users\user\AppData\Local\Temp\
                                • API String ID: 1100898210-4083868402
                                • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                                • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                                APIs
                                • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: CharPrevlstrlen
                                • String ID: C:\Users\user\Desktop
                                • API String ID: 2709904686-1876063424
                                • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                                • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                                • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                                APIs
                                • GlobalAlloc.KERNEL32(00000040,?), ref: 6FED116A
                                • GlobalFree.KERNEL32(00000000), ref: 6FED11C7
                                • GlobalFree.KERNEL32(00000000), ref: 6FED11D9
                                • GlobalFree.KERNEL32(?), ref: 6FED1203
                                Memory Dump Source
                                • Source File: 00000000.00000002.1887958552.000000006FED1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6FED0000, based on PE: true
                                • Associated: 00000000.00000002.1887891856.000000006FED0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887978786.000000006FED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                • Associated: 00000000.00000002.1887995999.000000006FED6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_6fed0000_PO.jbxd
                                Similarity
                                • API ID: Global$Free$Alloc
                                • String ID:
                                • API String ID: 1780285237-0
                                • Opcode ID: 3b660b67e2c24ce75449a625602c9bbbb1a289ae3e517049a96790e9f43b7423
                                • Instruction ID: d2e4d12f0b4302fe4f2d22481c92802c54d1873d4edccef7e26f0ae8d3565f60
                                • Opcode Fuzzy Hash: 3b660b67e2c24ce75449a625602c9bbbb1a289ae3e517049a96790e9f43b7423
                                • Instruction Fuzzy Hash: 24319EB25003159FFB008FE8E945A65BFEDEB47225720421BF840D7A54E73DE8128760
                                APIs
                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                                • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                                • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1852072750.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.1852034709.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852099843.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852155535.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1852594307.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                                Similarity
                                • API ID: lstrlen$CharNextlstrcmpi
                                • String ID:
                                • API String ID: 190613189-0
                                • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                                • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9