Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample name:PO.exe
Analysis ID:1558395
MD5:53441f2de2d573f3b2e4fb35c248229b
SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample execution stops while process was sleeping (likely an evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Uses 32bit PE files

Classification

  • System is w10x64
  • PO.exe (PID: 1656 cmdline: "C:\Users\user\Desktop\PO.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
    • PO.exe (PID: 4708 cmdline: "C:\Users\user\Desktop\PO.exe" MD5: 53441F2DE2D573F3B2E4FB35C248229B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2512620993.00000000050D3000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000004.00000002.3949117275.0000000002153000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: PO.exeAvira: detected
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.binAvira URL Cloud: Label: malware
      Source: http://173.249.193.48/VdpAwrpsFeHTHv196.bin/Avira URL Cloud: Label: malware
      Source: PO.exeReversingLabs: Detection: 83%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: global trafficTCP traffic: 192.168.2.5:49712 -> 173.249.193.48:80
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: unknownTCP traffic detected without corresponding DNS query: 173.249.193.48
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin
      Source: PO.exe, 00000004.00000002.3952803376.0000000004B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin/
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin1e
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin2g
      Source: PO.exe, 00000004.00000002.3952803376.0000000004B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bin3
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binF
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binT
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.bins
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://173.249.193.48/VdpAwrpsFeHTHv196.binyP
      Source: PO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: PO.exe, 00000004.00000001.2511257066.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: PO.exe, 00000004.00000001.2511257066.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Windows\resources\0809Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_73471B5F0_2_73471B5F
      Source: PO.exeStatic PE information: invalid certificate
      Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/11@0/1
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\kretekniske.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsr648F.tmpJump to behavior
      Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: PO.exeReversingLabs: Detection: 83%
      Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeFile written: C:\Program Files (x86)\Common Files\kvindagtigt.iniJump to behavior
      Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: mshtml.pdbUGP source: PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2512620993.00000000050D3000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.3949117275.0000000002153000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_73471B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73471B5F
      Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nso6972.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\PO.exeAPI/Special instruction interceptor: Address: 50E2FD0
      Source: C:\Users\user\Desktop\PO.exeAPI/Special instruction interceptor: Address: 2162FD0
      Source: C:\Users\user\Desktop\PO.exeRDTSC instruction interceptor: First address: 50B96E2 second address: 50B96E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F0D20CC3E56h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\PO.exeRDTSC instruction interceptor: First address: 21396E2 second address: 21396E2 instructions: 0x00000000 rdtsc 0x00000002 cmp ah, ch 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F0D207D2F46h 0x00000008 cmp ah, ch 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\PO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nso6972.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\PO.exe TID: 7136Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\PO.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0040674C FindFirstFileW,FindClose,0_2_0040674C
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00405B00 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405B00
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BDC000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000004.00000002.3952803376.0000000004BAD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: PO.exe, 00000004.00000002.3952803376.0000000004BDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWD
      Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end nodegraph_0-2450
      Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end nodegraph_0-2663
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_73471B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73471B5F
      Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"Jump to behavior
      Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_004034A2 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034A2
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      12
      Masquerading
      OS Credential Dumping21
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      PO.exe83%ReversingLabsWin32.Trojan.GuLoader
      PO.exe100%AviraHEUR/AGEN.1333748
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nso6972.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin30%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binF0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binT0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin1e0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.binyP0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin2g0%Avira URL Cloudsafe
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.bin/100%Avira URL Cloudmalware
      http://173.249.193.48/VdpAwrpsFeHTHv196.bins0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdPO.exe, 00000004.00000001.2511257066.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
        high
        http://173.249.193.48/VdpAwrpsFeHTHv196.bin3PO.exe, 00000004.00000002.3952803376.0000000004B88000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binsPO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binPO.exe, 00000004.00000002.3952803376.0000000004BAD000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://173.249.193.48/VdpAwrpsFeHTHv196.binTPO.exe, 00000004.00000002.3952803376.0000000004BAD000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
          high
          http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdPO.exe, 00000004.00000001.2511257066.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
            high
            http://www.ftp.ftp://ftp.gopher.PO.exe, 00000004.00000001.2511257066.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
              high
              http://173.249.193.48/VdpAwrpsFeHTHv196.bin2gPO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/VdpAwrpsFeHTHv196.binFPO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://173.249.193.48/VdpAwrpsFeHTHv196.binyPPO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorPO.exefalse
                high
                http://173.249.193.48/VdpAwrpsFeHTHv196.bin/PO.exe, 00000004.00000002.3952803376.0000000004B88000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://173.249.193.48/VdpAwrpsFeHTHv196.bin1ePO.exe, 00000004.00000002.3952803376.0000000004BC4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                173.249.193.48
                unknownUnited States
                11878TZULOUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1558395
                Start date and time:2024-11-19 13:02:37 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 45s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:PO.exe
                Detection:MAL
                Classification:mal84.troj.evad.winEXE@3/11@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com
                • VT rate limit hit for: PO.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                173.249.193.48stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.48/dlDSZQaZvoFz216.bin
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                TZULOUSMagnetnaalene.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.108
                stormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.48
                Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                Brneforsorgspdagogers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • 173.249.193.66
                la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                • 173.249.236.72
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\nso6972.tmp\System.dllstormskridtets.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  orders_PI 008-01.exeGet hashmaliciousRemcos, GuLoaderBrowse
                    RemotePCViewer.exeGet hashmaliciousUnknownBrowse
                      8737738_19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                        8737738_19082024.vbsGet hashmaliciousGuLoaderBrowse
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):52
                          Entropy (8bit):4.0121618346445365
                          Encrypted:false
                          SSDEEP:3:BPi4YDgAmcAKDHMnhv:BPiBkAmc0nhv
                          MD5:F298228D2D42CED0A00B0C5320000835
                          SHA1:FB06F02DDCDA4C9EC752A688EE617064DB3A49EB
                          SHA-256:E399AFE89F97EAE7BCDAE626913DA1618F4F42BA11887217CDBF524720532AB2
                          SHA-512:464DA89F9E1D5935810443B20C3D19F77585D964DF89F5CB427482A03C8EF6274D06CBC01533D92C691FFD55E1725BA5F427D023A45A5128BCED0EEE11E083FE
                          Malicious:false
                          Reputation:low
                          Preview:[skaaltalerens]..nonsaleability=sammenstuvningerne..
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):12288
                          Entropy (8bit):5.737556724687435
                          Encrypted:false
                          SSDEEP:192:MenY0qWTlt70IAj/lQ0sEWc/wtYbBH2aDybC7y+XBaIwL:M8+Qlt70Fj/lQRY/9VjjgL
                          MD5:6E55A6E7C3FDBD244042EB15CB1EC739
                          SHA1:070EA80E2192ABC42F358D47B276990B5FA285A9
                          SHA-256:ACF90AB6F4EDC687E94AAF604D05E16E6CFB5E35873783B50C66F307A35C6506
                          SHA-512:2D504B74DA38EDC967E3859733A2A9CACD885DB82F0CA69BFB66872E882707314C54238344D45945DC98BAE85772ACEEF71A741787922D640627D3C8AE8F1C35
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          Joe Sandbox View:
                          • Filename: stormskridtets.exe, Detection: malicious, Browse
                          • Filename: orders_PI 008-01.exe, Detection: malicious, Browse
                          • Filename: RemotePCViewer.exe, Detection: malicious, Browse
                          • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                          • Filename: 8737738_19082024.vbs, Detection: malicious, Browse
                          Reputation:moderate, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...X..`...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text...O .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):589
                          Entropy (8bit):4.277818373535095
                          Encrypted:false
                          SSDEEP:12:mScXAtJsdW8lLQIVVCTP1t0laiam6mObo/Bpqwnh2yKbdB1j1f:mSrTsdRTVVM9Yz69Hwh2yKb7ff
                          MD5:E80E34F461528DF8F86C4248C971B2AD
                          SHA1:A1A74D8F5711DEED35AF2B81BE070CA471C39500
                          SHA-256:F2552D843F4D62F481743A15B7C95AA322C14EA5DBB999C8C889A42CBB093A8E
                          SHA-512:46A5D6487131677DAC16C2BE4FC29517C14CB8DB6228B40344D733597462122EF0D1D7DD69B4D5A7A10F9C86635F99D91E91AC2CEBDF923C6B72EF3809637622
                          Malicious:false
                          Reputation:low
                          Preview:pervalvar udvalgsarbejderne illegitime besully.trvarefabrikkers stemmeslugers binomialfordelingernes metropolit.mariolatrous griffy fiskeeksporten valutapuklerne spekulanter infusioners quantifys unconsolidation digitalises forvaltningsret..steticismens advents syde rebaptization returneredes chemosterilants agtvrdige,balklines sludres drengestregers topful koordinatvrdien angorakats tendensromanens blockheadish lidelsesfller eskapismes amiably phenicious nontenurial..overspringe udmntede agnostiker polycarpic stolper lbskes forhandlingsomraader acquires duskly kildnes gaultherase..
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):276701
                          Entropy (8bit):1.2570216910370695
                          Encrypted:false
                          SSDEEP:768:yFPJSwGwS4JXi8PNDQNMDeMW3SGBqGHw1zwpmPMoaO64g1abi4IZxeMcdN9vfd95:/rFf4EoTti54LkFvI3oDW
                          MD5:18C3DA2AA022FF0B89999E28E6A2AE9A
                          SHA1:0659DDE0FD4B39B22825F1645A0BAE7E7202C7F9
                          SHA-256:05DE1FF63CC38C7C4B3034091A311791BFF578658FF17D156AA4FB41A2E197C6
                          SHA-512:D3A51D8B29FEF026F94B339087413319E03DA3193D9159A43AD7B4FEE35A67EEEBC3E66A0092B5ED14F57458173D518C618F2EE00F4203F428EBE0FC162F667C
                          Malicious:false
                          Reputation:low
                          Preview:......................................................(.L.................................3........&.................."...........l........................s.....................................-...........................8..........@.........................................................h..................................@.........).........................I.................F..................................................................T..............................................................j..".......#I.............r.............&..................|...............................................................................:.Z......................).............................................................................H.......C...........................................................................................t.........................................................M.............4........'........................................}..+.......................
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):313672
                          Entropy (8bit):1.2567166720965932
                          Encrypted:false
                          SSDEEP:768:iEGLlMkjkYtwS3MeXM3OpckON5VIbjnI3Oif4NxZSqJbDvz+hE7IkHAYsaW3DQLF:LtWLdp3I3yrt+3SoTMU5oT5
                          MD5:17B0342D31B6E728E13DF79009833371
                          SHA1:B9F3354C4E886382D220D5EC4FA91F389585BD40
                          SHA-256:8CAF84CE635BD92186709E81D12AE352E049C83B53F1C22A6DCB221E8F1C011E
                          SHA-512:4772F5AE64E0619B23114A41785DDE7DD1A9BACE12A9ABEDEF3400EDB3660D4E780C9B91E23A9FDEC1D97BCF7DC48E201771D7D58EB1740191A05CCFDB433C83
                          Malicious:false
                          Preview:....................N............................k....................................................#.................................................................................`........0.............u...................................y................................................................g.........7................E.......&........w..............................................*....................<..................................3................i.......................................................................U...).................................................. ........................................................................................................................A..............................N......c.b.......................................................................................................N........T..............................................h..............................................................................
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):207881
                          Entropy (8bit):7.331635651026833
                          Encrypted:false
                          SSDEEP:3072:zDyy/gxfmTCBeuVaCzUVI90J8g5sF6963goPdEWduKiKMLUW3tTS4NrQsgT99BwE:zDyR4WDsCgVImsE77KMLUS44NMx
                          MD5:749F30B7C897431F55057BFE15DF7228
                          SHA1:2DB933559839DD5F79454546C98CCE8E9C4C8112
                          SHA-256:1506167C68DEBF892BD0E2EAD9515C1F3F80BCCA9C489E715F2436425B7D8D48
                          SHA-512:8E6BC090DFE67D411EA2B386538BAF9ADE1C7A47031CD4BFA0E7D491CFEF814923E71BA1DF8A2CB0A41AFADAE896F77BD89170BB560112E2A2B7BAA8DCD60C9D
                          Malicious:false
                          Preview:............ ..............EEEEE...............n..............C....F.......mm...........D..............ttt...--........``..:::....S....rrrr............P.O..6....".GG...............#.0.....................E..............22...~~.......aa............,..................................&..gg........77..LLLLLL.......ii.......0..o.ff..}.x... .99.....RR...............~~~~~.....................J......................kkk........E..........C...ee.........................G............J.............YY..~...2.............l........##.........Z.........(...........h.y........000.......yy...........l..lll...........................88...@@@@@.QQ..........^^...........mm...................CCC........KKKK.........2...............++..........V......-................B.........w................ ..............!!!....MM......66................===....................NNN..........S....??.........k........D.................................(............................. .........////....x.ccc.ZZ.w..====......
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):16857
                          Entropy (8bit):4.532822901243277
                          Encrypted:false
                          SSDEEP:384:+ipfHtyeVOvFfo92BAVO4tKq/vChYFVmuF1WbTeqFb7RfW:dlyttfo9iAVO4tiGmPZW
                          MD5:143CC97C03735690BA675F029A4A3A16
                          SHA1:7BBA23E28EDB92B05620AA4EA667D3C04DE93593
                          SHA-256:EDCF653A613FF7FB1143DF97441A7027D486CA942A333F3EA0B74C7C11F3D88B
                          SHA-512:01C2C26B31488E036F6C6634636B33A0C06672FF464549D12B653326FA1A90460FAF485C59D8F0B85C6CCF57946AC4D09A70B5A5D3609E93AD3DCDE421CF16A7
                          Malicious:false
                          Preview:.........UU..33........Z..nnnnnn....w.[..............EE................T.......................k..8e...r...n...e...l.N.3...2..M:...:.+.C...r..de...a...t...e...F.h.i...l...e...A...(...m... ...r...4... ...,... ...i... .&&0..cx...8...0...0...0...0...0...0...0...,..w ...i..w ...0...,... ...p... ...0...,... ...i... ...4...,... ...i... ..?0...x...8...0...,... .%%i... ...0...)...i.......r...8.......k...e...r...n...e...l._.3.~.2...:...:...S.**e...t..aF...i...l...e...P...o...i...n...t...e...r...(...i... ...r...8...,... ..vi... ...2...3...0...1...2... ...,... ...i... ./.0...,...i... ...0...)...i.......r...4.......k...e...r...n...e...l...3...2.s.:...:...V...i...r...t...u...a...l...A...l...l...o..Nc...(...i..y ...0...,...i... ...5...4..B0...6...7...2..N0...0...,... .ddi..G ...0...x...3...0...0...0...,... ..Bi... ...0...x..v4...0...)...p...../.r...2.......k...e...r.}.n...e...l..B3...2..U:...:...R.+.e...a...d...F...i...l...e...(...i... ...r...8...,... ...i... ...r...2...,... ...i... ..^5...4...0...6
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):244482
                          Entropy (8bit):1.2509108197987615
                          Encrypted:false
                          SSDEEP:768:ArczTS8oocp0tWLSMkXWg7PKU30gfL4Qf1AUdyM03I3xkjFlu7NDSAZd+6XYIHXd:7Yhp0ckXv78owAC3MhxqI
                          MD5:E6AC7A31DA2D4322339135AD20EB0F23
                          SHA1:F76C6D6EE7C9B01DB799642990AA88B140003EC4
                          SHA-256:00FAD7EC11DB9706955FDF3BE0E6FB037E9F9780F94A502A774B30AB52773A94
                          SHA-512:C87DABB08D092D546FF80270B052CF1C5D92D25852DBFECC139CE528CCD2A22CCE130A8C90C08117DF542E6D83DE91E92180F853C201F042BED4681D4737E75D
                          Malicious:false
                          Preview:............................................w.........................................................................\.............................o.............q......................................]..........................I...............!...............................................m....... ............................................................................................h......K................=............................................................r..................................W....................................................................R......................................p..0...........................................................k.........k........................d........................................................................................................................9....................................#.....A........`...9...............P.......................................................................\...............
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):430713
                          Entropy (8bit):1.2530301266200883
                          Encrypted:false
                          SSDEEP:1536:vu65sFtuGbUq4CCWG9TcLs9xEEc0MVWFnhMA:2PjbUquWUYs/9x
                          MD5:8ED0D91C7C65B02A5630D1A012895C3D
                          SHA1:FA74C3BD3A32123D71AEA67D386B5AC251FEC260
                          SHA-256:1113E4990BEF55E4CD1D868513B2305C72803FB296D559BFA9C8C93DE2EDC8AB
                          SHA-512:FBE41906CCABB44E8D71D7664B756F75ABDBF0FB80BFCBBF4BBA9D9370DF4CEDBE437BA9F116B3F9E9D2AE2FB1E2D34D34F152E518A2E5E0096A506093F8DB24
                          Malicious:false
                          Preview:..[.Z.....?............#......................................................0.....B..x....................................................Q.......Z......................I....j............{..........................................................................................................................................-.....7..............................M........9.U...........?...............................................................X..................../.....................t...............4................,........`........~..............d............................u............{.....................a.............................5.............{...g....Z.................H................l..........................S.............................................................................................................................J...........................................U............................x.....f.............D..../....o........................QLi...
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):223405
                          Entropy (8bit):1.2642457624863013
                          Encrypted:false
                          SSDEEP:768:DDh04DrooyUGbNSipoS0yYEt0ihBLBJU06zf8VWZt+il3sVxTD6I6o9+2u5inuB4:rorpFGQVWwj9bQdun2ljrAbUGl
                          MD5:96E6C0CBBACF232110DF3E7FC4B4D980
                          SHA1:FC18FDD4E5417AC76F68BF507AC0BA6B9A183CFE
                          SHA-256:04F64748055424253509A229EE3E6F9BFC86898CBA667DA8312333552987B610
                          SHA-512:8DD22ABBED1522A08E9AC3559F5CC6871B77C1B76C2A7AA0CD61E52CA7D3A43DCBAF00285BF29C1FF885FC5F424FA411F56F19EB1886DA97CC7010BCA66530A9
                          Malicious:false
                          Preview:....................................{............!.............Q.............................................................................:...........z..................................W.......................... ......................................3...........y...............j................!n...............................................................................3........................+.......................a.......................c........................................)............................................................................................................................?.............................................................................................S....../.....................................................6./...t..+.......................H............{..........&................................b............................R.......x....=..................V....]........>...................................m................0.....
                          Process:C:\Users\user\Desktop\PO.exe
                          File Type:DIY-Thermocam raw data (Lepton 2.x), scale 175-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8.000000
                          Category:dropped
                          Size (bytes):385914
                          Entropy (8bit):1.2561626561864936
                          Encrypted:false
                          SSDEEP:768:++TtgE2yMxqLKoiyt4CpVdIwu3Uema6LhlEv9cCAXP69rBqGDpx/NEJKTPLqqQJl:bMFgNCAE6oLJS9a/IrOyTWq2uC
                          MD5:A4946227DE4DC2A79BF473A3D09C4247
                          SHA1:9FF800E6B4A72B6281D812710D00AD003F757170
                          SHA-256:1F6BB50C9AC95A61782FCDE006B6E396ACEDA7794FD30FFB7D97020FD7B8059E
                          SHA-512:2902630584092375E1A2FB4669437C43548BC0D0E00B2B98A3FDAEEDC57F3567B61A3FC545C8157FD410D6E26C9A70E8D989E97983700FFB55D9D1154CEBE1F4
                          Malicious:false
                          Preview:..................................................#..................................._............................{.........................P................$.............................................................................................}............&................g.........................................A................................................K................................................Z..............-......5.........................................................e.......d..........................................L...............0......C................).................................................................................r............Q..2........................9................(...............................................t......................................................................>.....b..8.....................n.............]..................F.....................................U...................................S.........
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):6.460432078632097
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:PO.exe
                          File size:915'632 bytes
                          MD5:53441f2de2d573f3b2e4fb35c248229b
                          SHA1:afc840f25adfcb5873f5b69e55b2920c370a2285
                          SHA256:5bc4b28288f068f1c11e69b1cc94aacb4b0d2812494c1673471b890f1ce67a9e
                          SHA512:021ba2fc3570b82daf0181f229e5e0b80a10f6a74a3f77baa4d608961c38222b03d428f82b7d5abfca6fa55cbfebc7b5e715f33ecf8f67882186b6601bfcbda2
                          SSDEEP:12288:A3nIRS5/vuI8sOabBdHdWIXjwxipfpQGYAGau5yxX9O9u:A3IRgvuoO0pdZXjUiNuGYpawA9uu
                          TLSH:59156949A38C50C6DD3A3B32FA1D7613B655AC138550118A3AC8BE583BF57B07B9FA31
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L......`.................f....:....
                          Icon Hash:d3672eac1a0c662c
                          Entrypoint:0x4034a2
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x60FC90D1 [Sat Jul 24 22:14:41 2021 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:6e7f9a29f2c85394521a08b9f31f6275
                          Signature Valid:false
                          Signature Issuer:CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                          Error Number:-2146762487
                          Not Before, Not After
                          • 25/01/2024 10:16:23 24/01/2027 10:16:23
                          Subject Chain
                          • CN=Underretternes, O=Underretternes, L=Lannemezan, C=FR
                          Version:3
                          Thumbprint MD5:B7699D9FC11FF2BC8B537A1496DBA607
                          Thumbprint SHA-1:13E2B15CFFB46BFE6E63F1DDDD5D08B90EC97D8B
                          Thumbprint SHA-256:B488D28F491B0130739761D68A25298DFD95A7D90A466B370C1D833271156981
                          Serial:0C38DED2C7C23BE59C80206BBCC81E7BF88A1876
                          Instruction
                          sub esp, 000002D4h
                          push ebx
                          push esi
                          push edi
                          push 00000020h
                          pop edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+14h], ebx
                          mov dword ptr [esp+10h], 0040A2E0h
                          mov dword ptr [esp+1Ch], ebx
                          call dword ptr [004080CCh]
                          call dword ptr [004080D0h]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [007A8A6Ch], eax
                          je 00007F0D211A6913h
                          push ebx
                          call 00007F0D211A9C01h
                          cmp eax, ebx
                          je 00007F0D211A6909h
                          push 00000C00h
                          call eax
                          mov esi, 004082B0h
                          push esi
                          call 00007F0D211A9B7Bh
                          push esi
                          call dword ptr [00408154h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], 00000000h
                          jne 00007F0D211A68ECh
                          push 0000000Bh
                          call 00007F0D211A9BD4h
                          push 00000009h
                          call 00007F0D211A9BCDh
                          push 00000007h
                          mov dword ptr [007A8A64h], eax
                          call 00007F0D211A9BC1h
                          cmp eax, ebx
                          je 00007F0D211A6911h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007F0D211A6909h
                          or byte ptr [007A8A6Fh], 00000040h
                          push ebp
                          call dword ptr [00408038h]
                          push ebx
                          call dword ptr [00408298h]
                          mov dword ptr [007A8B38h], eax
                          push ebx
                          lea eax, dword ptr [esp+34h]
                          push 000002B4h
                          push eax
                          push ebx
                          push 0079FF08h
                          call dword ptr [0040818Ch]
                          push 0040A2C8h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3de0000x56ef8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0xdef900x920.data
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x656c0x660012117ad2476c7a7912407af0dcfcb8a7False0.6737515318627451data6.47208759712619IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x13980x1400e3e8d62e1d2308b175349eb9daa266c8False0.4494140625data5.137750894959169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x39eb780x6002020ca26e010546720fd467c5d087b57unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x3a90000x350000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x3de0000x56ef80x57000c1896e67b80e50079ebeadcac8c0d8c3False0.13646338451867815data2.5203155069997596IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x3de2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.11415584223451786
                          RT_ICON0x4202f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.17530758310658937
                          RT_ICON0x430b180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.27551867219917014
                          RT_ICON0x4330c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3295028142589118
                          RT_ICON0x4341680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.47074468085106386
                          RT_DIALOG0x4345d00x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x4346d00x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x4347f00xc4dataEnglishUnited States0.5918367346938775
                          RT_DIALOG0x4348b80x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x4349180x4cdataEnglishUnited States0.7894736842105263
                          RT_VERSION0x4349680x250dataEnglishUnited States0.5287162162162162
                          RT_MANIFEST0x434bb80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                          DLLImport
                          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, SetWindowPos, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersion, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, ExitProcess, CopyFileW, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 19, 2024 13:04:20.996702909 CET4971280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:22.137134075 CET4971280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:24.137125969 CET4971280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:35.060796976 CET4971980192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:36.058995962 CET4971980192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:38.058993101 CET4971980192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:49.091674089 CET4972080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:50.106023073 CET4972080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:04:52.105979919 CET4972080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:03.108952045 CET4972280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:04.105956078 CET4972280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:06.121716022 CET4972280192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:17.236413956 CET4972480192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:18.246651888 CET4972480192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:20.246665001 CET4972480192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:31.248296022 CET4972580192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:32.262295008 CET4972580192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:34.262209892 CET4972580192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:45.268707991 CET4972780192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:46.277812958 CET4972780192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:48.277838945 CET4972780192.168.2.5173.249.193.48
                          Nov 19, 2024 13:05:59.279383898 CET4973080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:00.293431997 CET4973080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:02.309051037 CET4973080192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:13.310384989 CET4973180192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:14.324721098 CET4973180192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:16.340389013 CET4973180192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:27.328277111 CET4973380192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:28.340352058 CET4973380192.168.2.5173.249.193.48
                          Nov 19, 2024 13:06:30.340435982 CET4973380192.168.2.5173.249.193.48

                          Click to jump to process

                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:07:03:30
                          Start date:19/11/2024
                          Path:C:\Users\user\Desktop\PO.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\PO.exe"
                          Imagebase:0x400000
                          File size:915'632 bytes
                          MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2512620993.00000000050D3000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:4
                          Start time:07:04:13
                          Start date:19/11/2024
                          Path:C:\Users\user\Desktop\PO.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\PO.exe"
                          Imagebase:0x400000
                          File size:915'632 bytes
                          MD5 hash:53441F2DE2D573F3B2E4FB35C248229B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.3949117275.0000000002153000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:27.2%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:18.5%
                            Total number of Nodes:704
                            Total number of Limit Nodes:17
                            execution_graph 2405 4034a2 SetErrorMode GetVersion 2406 4034e1 2405->2406 2407 4034e7 2405->2407 2408 4067e3 5 API calls 2406->2408 2495 406773 GetSystemDirectoryW 2407->2495 2408->2407 2410 4034fd lstrlenA 2410->2407 2411 40350d 2410->2411 2498 4067e3 GetModuleHandleA 2411->2498 2414 4067e3 5 API calls 2415 40351b 2414->2415 2416 4067e3 5 API calls 2415->2416 2417 403527 #17 OleInitialize SHGetFileInfoW 2416->2417 2504 4063ee lstrcpynW 2417->2504 2420 403573 GetCommandLineW 2505 4063ee lstrcpynW 2420->2505 2422 403585 2506 405cf0 2422->2506 2425 4036d4 GetTempPathW 2510 403471 2425->2510 2427 4036ec 2429 4036f0 GetWindowsDirectoryW lstrcatW 2427->2429 2430 403746 DeleteFileW 2427->2430 2428 4035c3 2431 405cf0 CharNextW 2428->2431 2436 4036bf 2428->2436 2438 4036bd 2428->2438 2433 403471 12 API calls 2429->2433 2520 403015 GetTickCount GetModuleFileNameW 2430->2520 2431->2428 2434 40370c 2433->2434 2434->2430 2435 403710 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2434->2435 2437 403471 12 API calls 2435->2437 2637 4063ee lstrcpynW 2436->2637 2442 40373e 2437->2442 2438->2425 2439 4037fd 2548 403abd 2439->2548 2440 40375a 2440->2439 2444 405cf0 CharNextW 2440->2444 2447 40380d 2440->2447 2442->2430 2442->2447 2462 403779 2444->2462 2654 4039e3 2447->2654 2448 403947 2450 4039cb ExitProcess 2448->2450 2451 40394f GetCurrentProcess OpenProcessToken 2448->2451 2449 403827 2661 405a54 2449->2661 2456 403967 LookupPrivilegeValueW AdjustTokenPrivileges 2451->2456 2457 40399b 2451->2457 2453 4037d7 2638 405dcb 2453->2638 2454 40383d 2604 4059bf 2454->2604 2456->2457 2461 4067e3 5 API calls 2457->2461 2465 4039a2 2461->2465 2462->2453 2462->2454 2468 4039b7 ExitWindowsEx 2465->2468 2471 4039c4 2465->2471 2466 403853 lstrcatW 2467 40385e lstrcatW lstrcmpiW 2466->2467 2467->2447 2470 40387a 2467->2470 2468->2450 2468->2471 2473 403886 2470->2473 2474 40387f 2470->2474 2669 40140b 2471->2669 2472 4037f2 2653 4063ee lstrcpynW 2472->2653 2665 4059a2 CreateDirectoryW 2473->2665 2607 405925 CreateDirectoryW 2474->2607 2480 40388b SetCurrentDirectoryW 2481 4038a6 2480->2481 2482 40389b 2480->2482 2612 4063ee lstrcpynW 2481->2612 2668 4063ee lstrcpynW 2482->2668 2487 4038f2 CopyFileW 2492 4038b4 2487->2492 2488 40393b 2489 4061b4 36 API calls 2488->2489 2489->2447 2491 40642b 17 API calls 2491->2492 2492->2488 2492->2491 2494 403926 CloseHandle 2492->2494 2613 40642b 2492->2613 2630 4061b4 MoveFileExW 2492->2630 2634 4059d7 CreateProcessW 2492->2634 2494->2492 2496 406795 wsprintfW LoadLibraryExW 2495->2496 2496->2410 2499 406809 GetProcAddress 2498->2499 2500 4067ff 2498->2500 2502 403514 2499->2502 2501 406773 3 API calls 2500->2501 2503 406805 2501->2503 2502->2414 2503->2499 2503->2502 2504->2420 2505->2422 2507 405cf6 2506->2507 2508 4035aa CharNextW 2507->2508 2509 405cfd CharNextW 2507->2509 2508->2425 2508->2428 2509->2507 2672 40669d 2510->2672 2512 403487 2512->2427 2513 40347d 2513->2512 2681 405cc3 lstrlenW CharPrevW 2513->2681 2516 4059a2 2 API calls 2517 403495 2516->2517 2684 405f13 2517->2684 2688 405ee4 GetFileAttributesW CreateFileW 2520->2688 2522 403055 2543 403065 2522->2543 2689 4063ee lstrcpynW 2522->2689 2524 40307b 2690 405d0f lstrlenW 2524->2690 2528 40308c GetFileSize 2529 403186 2528->2529 2541 4030a3 2528->2541 2695 402fb1 2529->2695 2531 40318f 2533 4031bf GlobalAlloc 2531->2533 2531->2543 2730 40345a SetFilePointer 2531->2730 2706 40345a SetFilePointer 2533->2706 2535 4031f2 2539 402fb1 6 API calls 2535->2539 2537 4031a8 2540 403444 ReadFile 2537->2540 2538 4031da 2707 40324c 2538->2707 2539->2543 2544 4031b3 2540->2544 2541->2529 2541->2535 2541->2543 2545 402fb1 6 API calls 2541->2545 2727 403444 2541->2727 2543->2440 2544->2533 2544->2543 2545->2541 2546 4031e6 2546->2543 2546->2546 2547 403223 SetFilePointer 2546->2547 2547->2543 2549 4067e3 5 API calls 2548->2549 2550 403ad1 2549->2550 2551 403ad7 2550->2551 2552 403ae9 2550->2552 2759 406335 wsprintfW 2551->2759 2760 4062bc 2552->2760 2555 403b38 lstrcatW 2557 403ae7 2555->2557 2751 403d93 2557->2751 2558 4062bc 3 API calls 2558->2555 2561 405dcb 18 API calls 2562 403b6a 2561->2562 2563 403bfe 2562->2563 2565 4062bc 3 API calls 2562->2565 2564 405dcb 18 API calls 2563->2564 2567 403c04 2564->2567 2568 403b9c 2565->2568 2566 403c14 LoadImageW 2570 403cba 2566->2570 2571 403c3b RegisterClassW 2566->2571 2567->2566 2569 40642b 17 API calls 2567->2569 2568->2563 2572 403bbd lstrlenW 2568->2572 2575 405cf0 CharNextW 2568->2575 2569->2566 2574 40140b 2 API calls 2570->2574 2573 403c71 SystemParametersInfoW CreateWindowExW 2571->2573 2603 403cc4 2571->2603 2576 403bf1 2572->2576 2577 403bcb lstrcmpiW 2572->2577 2573->2570 2578 403cc0 2574->2578 2579 403bba 2575->2579 2581 405cc3 3 API calls 2576->2581 2577->2576 2580 403bdb GetFileAttributesW 2577->2580 2583 403d93 18 API calls 2578->2583 2578->2603 2579->2572 2582 403be7 2580->2582 2584 403bf7 2581->2584 2582->2576 2585 405d0f 2 API calls 2582->2585 2586 403cd1 2583->2586 2765 4063ee lstrcpynW 2584->2765 2585->2576 2588 403d60 2586->2588 2589 403cdd ShowWindow 2586->2589 2766 405529 OleInitialize 2588->2766 2591 406773 3 API calls 2589->2591 2593 403cf5 2591->2593 2592 403d66 2595 403d82 2592->2595 2596 403d6a 2592->2596 2594 403d03 GetClassInfoW 2593->2594 2597 406773 3 API calls 2593->2597 2599 403d17 GetClassInfoW RegisterClassW 2594->2599 2600 403d2d DialogBoxParamW 2594->2600 2598 40140b 2 API calls 2595->2598 2602 40140b 2 API calls 2596->2602 2596->2603 2597->2594 2598->2603 2599->2600 2601 40140b 2 API calls 2600->2601 2601->2603 2602->2603 2603->2447 2605 4067e3 5 API calls 2604->2605 2606 403842 lstrcatW 2605->2606 2606->2466 2606->2467 2608 405976 GetLastError 2607->2608 2609 403884 2607->2609 2608->2609 2610 405985 SetFileSecurityW 2608->2610 2609->2480 2610->2609 2611 40599b GetLastError 2610->2611 2611->2609 2612->2492 2618 406438 2613->2618 2614 406683 2615 4038e5 DeleteFileW 2614->2615 2790 4063ee lstrcpynW 2614->2790 2615->2487 2615->2492 2617 406651 lstrlenW 2617->2618 2618->2614 2618->2617 2620 40642b 10 API calls 2618->2620 2622 4062bc 3 API calls 2618->2622 2623 406566 GetSystemDirectoryW 2618->2623 2624 406579 GetWindowsDirectoryW 2618->2624 2625 40669d 5 API calls 2618->2625 2626 40642b 10 API calls 2618->2626 2627 4065f4 lstrcatW 2618->2627 2628 4065ad SHGetSpecialFolderLocation 2618->2628 2788 406335 wsprintfW 2618->2788 2789 4063ee lstrcpynW 2618->2789 2620->2617 2622->2618 2623->2618 2624->2618 2625->2618 2626->2618 2627->2618 2628->2618 2629 4065c5 SHGetPathFromIDListW CoTaskMemFree 2628->2629 2629->2618 2631 4061d5 2630->2631 2632 4061c8 2630->2632 2631->2492 2791 40603a 2632->2791 2635 405a16 2634->2635 2636 405a0a CloseHandle 2634->2636 2635->2492 2636->2635 2637->2438 2825 4063ee lstrcpynW 2638->2825 2640 405ddc 2826 405d6e CharNextW CharNextW 2640->2826 2643 4037e3 2643->2447 2652 4063ee lstrcpynW 2643->2652 2644 40669d 5 API calls 2650 405df2 2644->2650 2645 405e23 lstrlenW 2646 405e2e 2645->2646 2645->2650 2647 405cc3 3 API calls 2646->2647 2649 405e33 GetFileAttributesW 2647->2649 2649->2643 2650->2643 2650->2645 2651 405d0f 2 API calls 2650->2651 2832 40674c FindFirstFileW 2650->2832 2651->2645 2652->2472 2653->2439 2655 4039fb 2654->2655 2656 4039ed CloseHandle 2654->2656 2835 403a28 2655->2835 2656->2655 2662 405a69 2661->2662 2663 403835 ExitProcess 2662->2663 2664 405a7d MessageBoxIndirectW 2662->2664 2664->2663 2666 4059b2 2665->2666 2667 4059b6 GetLastError 2665->2667 2666->2480 2667->2666 2668->2481 2670 401389 2 API calls 2669->2670 2671 401420 2670->2671 2671->2450 2679 4066aa 2672->2679 2673 406720 2674 406725 CharPrevW 2673->2674 2677 406746 2673->2677 2674->2673 2675 406713 CharNextW 2675->2673 2675->2679 2676 405cf0 CharNextW 2676->2679 2677->2513 2678 4066ff CharNextW 2678->2679 2679->2673 2679->2675 2679->2676 2679->2678 2680 40670e CharNextW 2679->2680 2680->2675 2682 40348f 2681->2682 2683 405cdf lstrcatW 2681->2683 2682->2516 2683->2682 2685 405f20 GetTickCount GetTempFileNameW 2684->2685 2686 4034a0 2685->2686 2687 405f56 2685->2687 2686->2427 2687->2685 2687->2686 2688->2522 2689->2524 2691 405d1d 2690->2691 2692 405d23 CharPrevW 2691->2692 2693 403081 2691->2693 2692->2691 2692->2693 2694 4063ee lstrcpynW 2693->2694 2694->2528 2696 402fd2 2695->2696 2697 402fba 2695->2697 2700 402fe2 GetTickCount 2696->2700 2701 402fda 2696->2701 2698 402fc3 DestroyWindow 2697->2698 2699 402fca 2697->2699 2698->2699 2699->2531 2703 402ff0 CreateDialogParamW ShowWindow 2700->2703 2704 403013 2700->2704 2731 40681f 2701->2731 2703->2704 2704->2531 2706->2538 2709 403265 2707->2709 2708 403293 2711 403444 ReadFile 2708->2711 2709->2708 2748 40345a SetFilePointer 2709->2748 2712 40329e 2711->2712 2713 4032b0 GetTickCount 2712->2713 2714 4033dd 2712->2714 2716 4033c7 2712->2716 2713->2716 2723 4032dc 2713->2723 2715 40341f 2714->2715 2720 4033e1 2714->2720 2718 403444 ReadFile 2715->2718 2716->2546 2717 403444 ReadFile 2717->2723 2718->2716 2719 403444 ReadFile 2719->2720 2720->2716 2720->2719 2721 405f96 WriteFile 2720->2721 2721->2720 2722 403332 GetTickCount 2722->2723 2723->2716 2723->2717 2723->2722 2724 403357 MulDiv wsprintfW 2723->2724 2746 405f96 WriteFile 2723->2746 2735 405456 2724->2735 2749 405f67 ReadFile 2727->2749 2730->2537 2732 40683c PeekMessageW 2731->2732 2733 406832 DispatchMessageW 2732->2733 2734 402fe0 2732->2734 2733->2732 2734->2531 2736 405471 2735->2736 2744 405513 2735->2744 2737 40548d lstrlenW 2736->2737 2738 40642b 17 API calls 2736->2738 2739 4054b6 2737->2739 2740 40549b lstrlenW 2737->2740 2738->2737 2741 4054c9 2739->2741 2742 4054bc SetWindowTextW 2739->2742 2743 4054ad lstrcatW 2740->2743 2740->2744 2741->2744 2745 4054cf SendMessageW SendMessageW SendMessageW 2741->2745 2742->2741 2743->2739 2744->2723 2745->2744 2747 405fb4 2746->2747 2747->2723 2748->2708 2750 403457 2749->2750 2750->2541 2752 403da7 2751->2752 2773 406335 wsprintfW 2752->2773 2754 403e18 2774 403e4c 2754->2774 2756 403b48 2756->2561 2757 403e1d 2757->2756 2758 40642b 17 API calls 2757->2758 2758->2757 2759->2557 2777 40625b 2760->2777 2763 4062f0 RegQueryValueExW RegCloseKey 2764 403b19 2763->2764 2764->2555 2764->2558 2765->2563 2781 404390 2766->2781 2768 40554c 2772 405573 2768->2772 2784 401389 2768->2784 2769 404390 SendMessageW 2770 405585 OleUninitialize 2769->2770 2770->2592 2772->2769 2773->2754 2775 40642b 17 API calls 2774->2775 2776 403e5a SetWindowTextW 2775->2776 2776->2757 2778 40626a 2777->2778 2779 406273 RegOpenKeyExW 2778->2779 2780 40626e 2778->2780 2779->2780 2780->2763 2780->2764 2782 4043a8 2781->2782 2783 404399 SendMessageW 2781->2783 2782->2768 2783->2782 2786 401390 2784->2786 2785 4013fe 2785->2768 2786->2785 2787 4013cb MulDiv SendMessageW 2786->2787 2787->2786 2788->2618 2789->2618 2790->2615 2792 406090 GetShortPathNameW 2791->2792 2793 40606a 2791->2793 2795 4060a5 2792->2795 2796 4061af 2792->2796 2818 405ee4 GetFileAttributesW CreateFileW 2793->2818 2795->2796 2798 4060ad wsprintfA 2795->2798 2796->2631 2797 406074 CloseHandle GetShortPathNameW 2797->2796 2799 406088 2797->2799 2800 40642b 17 API calls 2798->2800 2799->2792 2799->2796 2801 4060d5 2800->2801 2819 405ee4 GetFileAttributesW CreateFileW 2801->2819 2803 4060e2 2803->2796 2804 4060f1 GetFileSize GlobalAlloc 2803->2804 2805 406113 2804->2805 2806 4061a8 CloseHandle 2804->2806 2807 405f67 ReadFile 2805->2807 2806->2796 2808 40611b 2807->2808 2808->2806 2820 405e49 lstrlenA 2808->2820 2811 406132 lstrcpyA 2814 406154 2811->2814 2812 406146 2813 405e49 4 API calls 2812->2813 2813->2814 2815 40618b SetFilePointer 2814->2815 2816 405f96 WriteFile 2815->2816 2817 4061a1 GlobalFree 2816->2817 2817->2806 2818->2797 2819->2803 2821 405e8a lstrlenA 2820->2821 2822 405e63 lstrcmpiA 2821->2822 2823 405e92 2821->2823 2822->2823 2824 405e81 CharNextA 2822->2824 2823->2811 2823->2812 2824->2821 2825->2640 2827 405d8b 2826->2827 2831 405d9d 2826->2831 2828 405d98 CharNextW 2827->2828 2827->2831 2829 405dc1 2828->2829 2829->2643 2829->2644 2830 405cf0 CharNextW 2830->2831 2831->2829 2831->2830 2833 406762 FindClose 2832->2833 2834 40676d 2832->2834 2833->2834 2834->2650 2836 403a36 2835->2836 2837 403a00 2836->2837 2838 403a3b FreeLibrary GlobalFree 2836->2838 2839 405b00 2837->2839 2838->2837 2838->2838 2840 405dcb 18 API calls 2839->2840 2841 405b20 2840->2841 2842 405b28 DeleteFileW 2841->2842 2843 405b3f 2841->2843 2844 403816 OleUninitialize 2842->2844 2845 405c5f 2843->2845 2878 4063ee lstrcpynW 2843->2878 2844->2448 2844->2449 2845->2844 2852 40674c 2 API calls 2845->2852 2847 405b65 2848 405b78 2847->2848 2849 405b6b lstrcatW 2847->2849 2851 405d0f 2 API calls 2848->2851 2850 405b7e 2849->2850 2853 405b8e lstrcatW 2850->2853 2855 405b99 lstrlenW FindFirstFileW 2850->2855 2851->2850 2854 405c84 2852->2854 2853->2855 2854->2844 2856 405c88 2854->2856 2855->2845 2859 405bbb 2855->2859 2857 405cc3 3 API calls 2856->2857 2858 405c8e 2857->2858 2860 405ab8 5 API calls 2858->2860 2862 405c42 FindNextFileW 2859->2862 2870 405b00 60 API calls 2859->2870 2874 405c0c 2859->2874 2879 4063ee lstrcpynW 2859->2879 2863 405c9a 2860->2863 2862->2859 2864 405c58 FindClose 2862->2864 2865 405cb4 2863->2865 2866 405c9e 2863->2866 2864->2845 2868 405456 24 API calls 2865->2868 2866->2844 2869 405456 24 API calls 2866->2869 2868->2844 2871 405cab 2869->2871 2870->2874 2873 4061b4 36 API calls 2871->2873 2872 405456 24 API calls 2872->2862 2875 405cb2 2873->2875 2874->2862 2874->2872 2876 405456 24 API calls 2874->2876 2877 4061b4 36 API calls 2874->2877 2880 405ab8 2874->2880 2875->2844 2876->2874 2877->2874 2878->2847 2879->2859 2888 405ebf GetFileAttributesW 2880->2888 2883 405ae5 2883->2874 2884 405ad3 RemoveDirectoryW 2886 405ae1 2884->2886 2885 405adb DeleteFileW 2885->2886 2886->2883 2887 405af1 SetFileAttributesW 2886->2887 2887->2883 2889 405ed1 SetFileAttributesW 2888->2889 2890 405ac4 2888->2890 2889->2890 2890->2883 2890->2884 2890->2885 3012 73472ca3 3013 73472cbb 3012->3013 3014 7347158f 2 API calls 3013->3014 3015 73472cd6 3014->3015 3016 734710e1 3025 73471111 3016->3025 3017 734711d8 GlobalFree 3018 734712ba 2 API calls 3018->3025 3019 734711d3 3019->3017 3020 73471272 2 API calls 3023 734711c4 GlobalFree 3020->3023 3021 73471164 GlobalAlloc 3021->3025 3022 734711f8 GlobalFree 3022->3025 3023->3025 3024 734712e1 lstrcpyW 3024->3025 3025->3017 3025->3018 3025->3019 3025->3020 3025->3021 3025->3022 3025->3023 3025->3024 3026 73471000 3029 7347101b 3026->3029 3036 73471516 3029->3036 3031 73471020 3032 73471027 GlobalAlloc 3031->3032 3033 73471024 3031->3033 3032->3033 3034 7347153d 3 API calls 3033->3034 3035 73471019 3034->3035 3037 7347151c 3036->3037 3038 73471522 3037->3038 3039 7347152e GlobalFree 3037->3039 3038->3031 3039->3031 3040 7347166d 3041 73471516 GlobalFree 3040->3041 3044 73471685 3041->3044 3042 734716cb GlobalFree 3043 734716a0 3043->3042 3044->3042 3044->3043 3045 734716b7 VirtualFree 3044->3045 3045->3042 2894 403e6b 2895 403e83 2894->2895 2896 403fbe 2894->2896 2895->2896 2897 403e8f 2895->2897 2898 40400f 2896->2898 2899 403fcf GetDlgItem GetDlgItem 2896->2899 2900 403e9a SetWindowPos 2897->2900 2901 403ead 2897->2901 2903 404069 2898->2903 2911 401389 2 API calls 2898->2911 2902 404344 18 API calls 2899->2902 2900->2901 2905 403eb2 ShowWindow 2901->2905 2906 403eca 2901->2906 2907 403ff9 SetClassLongW 2902->2907 2904 404390 SendMessageW 2903->2904 2924 403fb9 2903->2924 2934 40407b 2904->2934 2905->2906 2908 403ed2 DestroyWindow 2906->2908 2909 403eec 2906->2909 2910 40140b 2 API calls 2907->2910 2964 4042cd 2908->2964 2912 403ef1 SetWindowLongW 2909->2912 2913 403f02 2909->2913 2910->2898 2914 404041 2911->2914 2912->2924 2917 403fab 2913->2917 2918 403f0e GetDlgItem 2913->2918 2914->2903 2919 404045 SendMessageW 2914->2919 2915 40140b 2 API calls 2915->2934 2916 4042cf DestroyWindow EndDialog 2916->2964 2974 4043ab 2917->2974 2922 403f21 SendMessageW IsWindowEnabled 2918->2922 2923 403f3e 2918->2923 2919->2924 2921 4042fe ShowWindow 2921->2924 2922->2923 2922->2924 2926 403f4b 2923->2926 2927 403f92 SendMessageW 2923->2927 2928 403f5e 2923->2928 2937 403f43 2923->2937 2925 40642b 17 API calls 2925->2934 2926->2927 2926->2937 2927->2917 2931 403f66 2928->2931 2932 403f7b 2928->2932 2930 404344 18 API calls 2930->2934 2935 40140b 2 API calls 2931->2935 2936 40140b 2 API calls 2932->2936 2933 403f79 2933->2917 2934->2915 2934->2916 2934->2924 2934->2925 2934->2930 2955 40420f DestroyWindow 2934->2955 2965 404344 2934->2965 2935->2937 2938 403f82 2936->2938 2971 40431d 2937->2971 2938->2917 2938->2937 2940 4040f6 GetDlgItem 2941 404113 ShowWindow KiUserCallbackDispatcher 2940->2941 2942 40410b 2940->2942 2968 404366 KiUserCallbackDispatcher 2941->2968 2942->2941 2944 40413d EnableWindow 2947 404151 2944->2947 2945 404156 GetSystemMenu EnableMenuItem SendMessageW 2946 404186 SendMessageW 2945->2946 2945->2947 2946->2947 2947->2945 2949 403e4c 18 API calls 2947->2949 2969 404379 SendMessageW 2947->2969 2970 4063ee lstrcpynW 2947->2970 2949->2947 2951 4041b5 lstrlenW 2952 40642b 17 API calls 2951->2952 2953 4041cb SetWindowTextW 2952->2953 2954 401389 2 API calls 2953->2954 2954->2934 2956 404229 CreateDialogParamW 2955->2956 2955->2964 2957 40425c 2956->2957 2956->2964 2958 404344 18 API calls 2957->2958 2959 404267 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2958->2959 2960 401389 2 API calls 2959->2960 2961 4042ad 2960->2961 2961->2924 2962 4042b5 ShowWindow 2961->2962 2963 404390 SendMessageW 2962->2963 2963->2964 2964->2921 2964->2924 2966 40642b 17 API calls 2965->2966 2967 40434f SetDlgItemTextW 2966->2967 2967->2940 2968->2944 2969->2947 2970->2951 2972 404324 2971->2972 2973 40432a SendMessageW 2971->2973 2972->2973 2973->2933 2975 40446e 2974->2975 2976 4043c3 GetWindowLongW 2974->2976 2975->2924 2976->2975 2977 4043d8 2976->2977 2977->2975 2978 404405 GetSysColor 2977->2978 2979 404408 2977->2979 2978->2979 2980 404418 SetBkMode 2979->2980 2981 40440e SetTextColor 2979->2981 2982 404430 GetSysColor 2980->2982 2983 404436 2980->2983 2981->2980 2982->2983 2984 404447 2983->2984 2985 40443d SetBkColor 2983->2985 2984->2975 2986 404461 CreateBrushIndirect 2984->2986 2987 40445a DeleteObject 2984->2987 2985->2984 2986->2975 2987->2986 3049 402f2b 3050 402f56 3049->3050 3051 402f3d SetTimer 3049->3051 3052 402fab 3050->3052 3053 402f70 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3050->3053 3051->3050 3053->3052 3054 73472349 3055 734723b3 3054->3055 3056 734723dd 3055->3056 3057 734723be GlobalAlloc 3055->3057 3057->3055 2240 73471777 2241 734717aa 2240->2241 2282 73471b5f 2241->2282 2243 734717b1 2244 734718d6 2243->2244 2245 734717c2 2243->2245 2246 734717c9 2243->2246 2332 7347239e 2245->2332 2316 734723e0 2246->2316 2251 7347180f 2345 734725b5 2251->2345 2252 7347182d 2255 73471833 2252->2255 2256 7347187e 2252->2256 2253 734717df 2258 734717e5 2253->2258 2263 734717f0 2253->2263 2254 734717f8 2267 734717ee 2254->2267 2342 73472d83 2254->2342 2364 734715c6 2255->2364 2261 734725b5 10 API calls 2256->2261 2258->2267 2326 73472af8 2258->2326 2268 7347186f 2261->2268 2262 73471815 2356 734715b4 2262->2356 2336 73472770 2263->2336 2267->2251 2267->2252 2273 734718c5 2268->2273 2370 73472578 2268->2370 2270 734717f6 2270->2267 2271 734725b5 10 API calls 2271->2268 2273->2244 2275 734718cf GlobalFree 2273->2275 2275->2244 2279 734718b1 2279->2273 2374 7347153d wsprintfW 2279->2374 2281 734718aa FreeLibrary 2281->2279 2377 7347121b GlobalAlloc 2282->2377 2284 73471b86 2378 7347121b GlobalAlloc 2284->2378 2286 73471dcb GlobalFree GlobalFree GlobalFree 2287 73471de8 2286->2287 2298 73471e32 2286->2298 2289 734721de 2287->2289 2295 73471dfd 2287->2295 2287->2298 2288 73471c86 GlobalAlloc 2308 73471b91 2288->2308 2290 73472200 GetModuleHandleW 2289->2290 2289->2298 2291 73472226 2290->2291 2292 73472211 LoadLibraryW 2290->2292 2385 7347161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2291->2385 2292->2291 2292->2298 2293 73471cd1 lstrcpyW 2297 73471cdb lstrcpyW 2293->2297 2294 73471cef GlobalFree 2294->2308 2295->2298 2381 7347122c 2295->2381 2297->2308 2298->2243 2299 73472278 2299->2298 2303 73472285 lstrlenW 2299->2303 2300 73472086 2384 7347121b GlobalAlloc 2300->2384 2386 7347161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2303->2386 2304 73471fc7 GlobalFree 2304->2308 2305 7347210e 2305->2298 2313 73472176 lstrcpyW 2305->2313 2306 73472238 2306->2299 2314 73472262 GetProcAddress 2306->2314 2308->2286 2308->2288 2308->2293 2308->2294 2308->2297 2308->2298 2308->2300 2308->2304 2308->2305 2309 73471d2d 2308->2309 2311 7347122c 2 API calls 2308->2311 2309->2308 2379 7347158f GlobalSize GlobalAlloc 2309->2379 2310 7347229f 2310->2298 2311->2308 2313->2298 2314->2299 2315 7347208f 2315->2243 2317 734723f8 2316->2317 2319 73472521 GlobalFree 2317->2319 2320 734724a0 GlobalAlloc WideCharToMultiByte 2317->2320 2321 734724cb GlobalAlloc CLSIDFromString 2317->2321 2323 7347122c GlobalAlloc lstrcpynW 2317->2323 2325 734724ea 2317->2325 2388 734712ba 2317->2388 2319->2317 2322 734717cf 2319->2322 2320->2319 2321->2319 2322->2253 2322->2254 2322->2267 2323->2317 2325->2319 2392 73472704 2325->2392 2327 73472b0a 2326->2327 2328 73472baf VirtualAlloc 2327->2328 2331 73472bcd 2328->2331 2330 73472c99 2330->2267 2395 73472aa2 2331->2395 2333 734723b3 2332->2333 2334 734717c8 2333->2334 2335 734723be GlobalAlloc 2333->2335 2334->2246 2335->2333 2340 734727a0 2336->2340 2337 7347284e 2339 73472854 GlobalSize 2337->2339 2341 7347285e 2337->2341 2338 7347283b GlobalAlloc 2338->2341 2339->2341 2340->2337 2340->2338 2341->2270 2343 73472d8e 2342->2343 2344 73472dce GlobalFree 2343->2344 2399 7347121b GlobalAlloc 2345->2399 2347 7347266b lstrcpynW 2352 734725bf 2347->2352 2348 7347265a StringFromGUID2 2348->2352 2349 73472638 MultiByteToWideChar 2349->2352 2350 7347267e wsprintfW 2350->2352 2351 734726a2 GlobalFree 2351->2352 2352->2347 2352->2348 2352->2349 2352->2350 2352->2351 2353 734726d7 GlobalFree 2352->2353 2354 73471272 2 API calls 2352->2354 2400 734712e1 2352->2400 2353->2262 2354->2352 2404 7347121b GlobalAlloc 2356->2404 2358 734715b9 2359 734715c6 2 API calls 2358->2359 2360 734715c3 2359->2360 2361 73471272 2360->2361 2362 734712b5 GlobalFree 2361->2362 2363 7347127b GlobalAlloc lstrcpynW 2361->2363 2362->2268 2363->2362 2365 734715d2 wsprintfW 2364->2365 2368 734715ff lstrcpyW 2364->2368 2369 73471618 2365->2369 2368->2369 2369->2271 2371 73472586 2370->2371 2372 73471891 2370->2372 2371->2372 2373 734725a2 GlobalFree 2371->2373 2372->2279 2372->2281 2373->2371 2375 73471272 2 API calls 2374->2375 2376 7347155e 2375->2376 2376->2273 2377->2284 2378->2308 2380 734715ad 2379->2380 2380->2309 2387 7347121b GlobalAlloc 2381->2387 2383 7347123b lstrcpynW 2383->2298 2384->2315 2385->2306 2386->2310 2387->2383 2389 734712c1 2388->2389 2390 7347122c 2 API calls 2389->2390 2391 734712df 2390->2391 2391->2317 2393 73472712 VirtualAlloc 2392->2393 2394 73472768 2392->2394 2393->2394 2394->2325 2396 73472aad 2395->2396 2397 73472ab2 GetLastError 2396->2397 2398 73472abd 2396->2398 2397->2398 2398->2330 2399->2352 2401 7347130c 2400->2401 2402 734712ea 2400->2402 2401->2352 2402->2401 2403 734712f0 lstrcpyW 2402->2403 2403->2401 2404->2358 2988 734716d4 2989 73471703 2988->2989 2990 73471b5f 22 API calls 2989->2990 2991 7347170a 2990->2991 2992 73471711 2991->2992 2993 7347171d 2991->2993 2994 73471272 2 API calls 2992->2994 2995 73471727 2993->2995 2996 73471744 2993->2996 2999 7347171b 2994->2999 3000 7347153d 3 API calls 2995->3000 2997 7347176e 2996->2997 2998 7347174a 2996->2998 3002 7347153d 3 API calls 2997->3002 3001 734715b4 3 API calls 2998->3001 3003 7347172c 3000->3003 3004 7347174f 3001->3004 3002->2999 3005 734715b4 3 API calls 3003->3005 3006 73471272 2 API calls 3004->3006 3007 73471732 3005->3007 3008 73471755 GlobalFree 3006->3008 3009 73471272 2 API calls 3007->3009 3008->2999 3010 73471769 GlobalFree 3008->3010 3011 73471738 GlobalFree 3009->3011 3010->2999 3011->2999 2891 734729df 2892 73472a2f 2891->2892 2893 734729ef VirtualProtect 2891->2893 2893->2892 3046 7347103d 3047 7347101b 5 API calls 3046->3047 3048 73471056 3047->3048 3058 734718d9 3059 734718fc 3058->3059 3060 73471931 GlobalFree 3059->3060 3061 73471943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3059->3061 3060->3061 3062 73471272 2 API calls 3061->3062 3063 73471ace GlobalFree GlobalFree 3062->3063 3064 73471058 3066 73471074 3064->3066 3065 734710dd 3066->3065 3067 73471516 GlobalFree 3066->3067 3068 73471092 3066->3068 3067->3068 3069 73471516 GlobalFree 3068->3069 3070 734710a2 3069->3070 3071 734710b2 3070->3071 3072 734710a9 GlobalSize 3070->3072 3073 734710b6 GlobalAlloc 3071->3073 3074 734710c7 3071->3074 3072->3071 3075 7347153d 3 API calls 3073->3075 3076 734710d2 GlobalFree 3074->3076 3075->3074 3076->3065

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 4034a2-4034df SetErrorMode GetVersion 1 4034e1-4034e9 call 4067e3 0->1 2 4034f2 0->2 1->2 7 4034eb 1->7 4 4034f7-40350b call 406773 lstrlenA 2->4 9 40350d-403529 call 4067e3 * 3 4->9 7->2 16 40353a-403599 #17 OleInitialize SHGetFileInfoW call 4063ee GetCommandLineW call 4063ee 9->16 17 40352b-403531 9->17 24 4035a3-4035bd call 405cf0 CharNextW 16->24 25 40359b-4035a2 16->25 17->16 21 403533 17->21 21->16 28 4035c3-4035c9 24->28 29 4036d4-4036ee GetTempPathW call 403471 24->29 25->24 30 4035d2-4035d6 28->30 31 4035cb-4035d0 28->31 38 4036f0-40370e GetWindowsDirectoryW lstrcatW call 403471 29->38 39 403746-403760 DeleteFileW call 403015 29->39 33 4035d8-4035dc 30->33 34 4035dd-4035e1 30->34 31->30 31->31 33->34 36 4036a0-4036ad call 405cf0 34->36 37 4035e7-4035ed 34->37 54 4036b1-4036b7 36->54 55 4036af-4036b0 36->55 42 403608-403641 37->42 43 4035ef-4035f7 37->43 38->39 53 403710-403740 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403471 38->53 56 403811-403821 call 4039e3 OleUninitialize 39->56 57 403766-40376c 39->57 49 403643-403648 42->49 50 40365e-403698 42->50 47 4035f9-4035fc 43->47 48 4035fe 43->48 47->42 47->48 48->42 49->50 58 40364a-403652 49->58 50->36 52 40369a-40369e 50->52 52->36 59 4036bf-4036cd call 4063ee 52->59 53->39 53->56 54->28 61 4036bd 54->61 55->54 75 403947-40394d 56->75 76 403827-403837 call 405a54 ExitProcess 56->76 62 403801-403808 call 403abd 57->62 63 403772-40377d call 405cf0 57->63 65 403654-403657 58->65 66 403659 58->66 68 4036d2 59->68 61->68 74 40380d 62->74 79 4037cb-4037d5 63->79 80 40377f-4037b4 63->80 65->50 65->66 66->50 68->29 74->56 77 4039cb-4039d3 75->77 78 40394f-403965 GetCurrentProcess OpenProcessToken 75->78 88 4039d5 77->88 89 4039d9-4039dd ExitProcess 77->89 85 403967-403995 LookupPrivilegeValueW AdjustTokenPrivileges 78->85 86 40399b-4039a9 call 4067e3 78->86 82 4037d7-4037e5 call 405dcb 79->82 83 40383d-403851 call 4059bf lstrcatW 79->83 87 4037b6-4037ba 80->87 82->56 99 4037e7-4037fd call 4063ee * 2 82->99 100 403853-403859 lstrcatW 83->100 101 40385e-403878 lstrcatW lstrcmpiW 83->101 85->86 102 4039b7-4039c2 ExitWindowsEx 86->102 103 4039ab-4039b5 86->103 93 4037c3-4037c7 87->93 94 4037bc-4037c1 87->94 88->89 93->87 98 4037c9 93->98 94->93 94->98 98->79 99->62 100->101 101->56 105 40387a-40387d 101->105 102->77 106 4039c4-4039c6 call 40140b 102->106 103->102 103->106 108 403886 call 4059a2 105->108 109 40387f call 405925 105->109 106->77 117 40388b-403899 SetCurrentDirectoryW 108->117 116 403884 109->116 116->117 118 4038a6-4038cf call 4063ee 117->118 119 40389b-4038a1 call 4063ee 117->119 123 4038d4-4038f0 call 40642b DeleteFileW 118->123 119->118 126 403931-403939 123->126 127 4038f2-403902 CopyFileW 123->127 126->123 129 40393b-403942 call 4061b4 126->129 127->126 128 403904-40391d call 4061b4 call 40642b call 4059d7 127->128 137 403922-403924 128->137 129->56 137->126 138 403926-40392d CloseHandle 137->138 138->126
                            APIs
                            • SetErrorMode.KERNELBASE ref: 004034C5
                            • GetVersion.KERNEL32 ref: 004034CB
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034FE
                            • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 0040353B
                            • OleInitialize.OLE32(00000000), ref: 00403542
                            • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 0040355E
                            • GetCommandLineW.KERNEL32(007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 00403573
                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PO.exe",00000020,"C:\Users\user\Desktop\PO.exe",00000000,?,00000007,00000009,0000000B), ref: 004035AB
                              • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                              • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004036E5
                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004036F6
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403702
                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 00403716
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040371E
                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 0040372F
                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403737
                            • DeleteFileW.KERNELBASE(1033,?,00000007,00000009,0000000B), ref: 0040374B
                              • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                            • OleUninitialize.OLE32(00000007,?,00000007,00000009,0000000B), ref: 00403816
                            • ExitProcess.KERNEL32 ref: 00403837
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 0040384A
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403859
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403864
                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PO.exe",00000000,00000007,?,00000007,00000009,0000000B), ref: 00403870
                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 0040388C
                            • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,00000009,?,00000007,00000009,0000000B), ref: 004038E6
                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\PO.exe,0079F708,00000001,?,00000007,00000009,0000000B), ref: 004038FA
                            • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000,?,00000007,00000009,0000000B), ref: 00403927
                            • GetCurrentProcess.KERNEL32(00000028,0000000B,00000007,00000009,0000000B), ref: 00403956
                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040395D
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403972
                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403995
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004039BA
                            • ExitProcess.KERNEL32 ref: 004039DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                            • String ID: "C:\Users\user\Desktop\PO.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods\Minkfarms$C:\Users\user\Desktop$C:\Users\user\Desktop\PO.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                            • API String ID: 3441113951-1990259251
                            • Opcode ID: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                            • Instruction ID: d7b9bf8e5ec5db16f392776339999e6c5d6af7d7718e861a4dfbc7241a8cc938
                            • Opcode Fuzzy Hash: 548301c1dfa22215a8893450befa883167be07a4132e0a9c717a82b6bd7fd6f7
                            • Instruction Fuzzy Hash: 65D1F6B1200310AAD7207F659D49B2B3AACEB81749F10843FF581B62D1DB7D8A55C76E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 385 405b00-405b26 call 405dcb 388 405b28-405b3a DeleteFileW 385->388 389 405b3f-405b46 385->389 390 405cbc-405cc0 388->390 391 405b48-405b4a 389->391 392 405b59-405b69 call 4063ee 389->392 393 405b50-405b53 391->393 394 405c6a-405c6f 391->394 398 405b78-405b79 call 405d0f 392->398 399 405b6b-405b76 lstrcatW 392->399 393->392 393->394 394->390 397 405c71-405c74 394->397 400 405c76-405c7c 397->400 401 405c7e-405c86 call 40674c 397->401 402 405b7e-405b82 398->402 399->402 400->390 401->390 409 405c88-405c9c call 405cc3 call 405ab8 401->409 405 405b84-405b8c 402->405 406 405b8e-405b94 lstrcatW 402->406 405->406 408 405b99-405bb5 lstrlenW FindFirstFileW 405->408 406->408 410 405bbb-405bc3 408->410 411 405c5f-405c63 408->411 425 405cb4-405cb7 call 405456 409->425 426 405c9e-405ca1 409->426 415 405be3-405bf7 call 4063ee 410->415 416 405bc5-405bcd 410->416 411->394 414 405c65 411->414 414->394 427 405bf9-405c01 415->427 428 405c0e-405c19 call 405ab8 415->428 419 405c42-405c52 FindNextFileW 416->419 420 405bcf-405bd7 416->420 419->410 424 405c58-405c59 FindClose 419->424 420->415 421 405bd9-405be1 420->421 421->415 421->419 424->411 425->390 426->400 429 405ca3-405cb2 call 405456 call 4061b4 426->429 427->419 430 405c03-405c07 call 405b00 427->430 438 405c3a-405c3d call 405456 428->438 439 405c1b-405c1e 428->439 429->390 437 405c0c 430->437 437->419 438->419 442 405c20-405c30 call 405456 call 4061b4 439->442 443 405c32-405c38 439->443 442->419 443->419
                            APIs
                            • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B29
                            • lstrcatW.KERNEL32(007A3F50,\*.*,007A3F50,?), ref: 00405B71
                            • lstrcatW.KERNEL32(?,0040A014,?,007A3F50,?), ref: 00405B94
                            • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?), ref: 00405B9A
                            • FindFirstFileW.KERNELBASE(007A3F50,?,?,?,0040A014,?,007A3F50,?), ref: 00405BAA
                            • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405C4A
                            • FindClose.KERNEL32(00000000), ref: 00405C59
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                            • API String ID: 2035342205-1913654065
                            • Opcode ID: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                            • Instruction ID: d176cfcb2707c6ba555092c79fa60715814496245c058da0d6595325efdb1864
                            • Opcode Fuzzy Hash: 2e078cdcde706d48225d83f3244a5f4697d9a3fc09f8fc82c0d1a14fe090b8d5
                            • Instruction Fuzzy Hash: BE41D530804A15AAEB216B658D89EBF7678EF42715F14813FF801711D2DB7C5E82CE6E
                            APIs
                            • FindFirstFileW.KERNELBASE(?,007A4F98,C:\,00405E14,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00406757
                            • FindClose.KERNEL32(00000000), ref: 00406763
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID: C:\
                            • API String ID: 2295610775-3404278061
                            • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                            • Instruction ID: 5230d556015edc92dacd95909e5542708b333c59f405b635cf09ddc887f28092
                            • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                            • Instruction Fuzzy Hash: CCD012315192205FC75027386F0C84B7A599F567353264B36F0AAF21E0C6788C3286AC

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 139 403e6b-403e7d 140 403e83-403e89 139->140 141 403fbe-403fcd 139->141 140->141 142 403e8f-403e98 140->142 143 40401c-404031 141->143 144 403fcf-404017 GetDlgItem * 2 call 404344 SetClassLongW call 40140b 141->144 145 403e9a-403ea7 SetWindowPos 142->145 146 403ead-403eb0 142->146 148 404071-404076 call 404390 143->148 149 404033-404036 143->149 144->143 145->146 151 403eb2-403ec4 ShowWindow 146->151 152 403eca-403ed0 146->152 157 40407b-404096 148->157 154 404038-404043 call 401389 149->154 155 404069-40406b 149->155 151->152 158 403ed2-403ee7 DestroyWindow 152->158 159 403eec-403eef 152->159 154->155 176 404045-404064 SendMessageW 154->176 155->148 156 404311 155->156 164 404313-40431a 156->164 162 404098-40409a call 40140b 157->162 163 40409f-4040a5 157->163 165 4042ee-4042f4 158->165 167 403ef1-403efd SetWindowLongW 159->167 168 403f02-403f08 159->168 162->163 172 4040ab-4040b6 163->172 173 4042cf-4042e8 DestroyWindow EndDialog 163->173 165->156 171 4042f6-4042fc 165->171 167->164 174 403fab-403fb9 call 4043ab 168->174 175 403f0e-403f1f GetDlgItem 168->175 171->156 178 4042fe-404307 ShowWindow 171->178 172->173 179 4040bc-404109 call 40642b call 404344 * 3 GetDlgItem 172->179 173->165 174->164 180 403f21-403f38 SendMessageW IsWindowEnabled 175->180 181 403f3e-403f41 175->181 176->164 178->156 209 404113-40414f ShowWindow KiUserCallbackDispatcher call 404366 EnableWindow 179->209 210 40410b-404110 179->210 180->156 180->181 184 403f43-403f44 181->184 185 403f46-403f49 181->185 186 403f74-403f79 call 40431d 184->186 187 403f57-403f5c 185->187 188 403f4b-403f51 185->188 186->174 190 403f92-403fa5 SendMessageW 187->190 192 403f5e-403f64 187->192 188->190 191 403f53-403f55 188->191 190->174 191->186 195 403f66-403f6c call 40140b 192->195 196 403f7b-403f84 call 40140b 192->196 205 403f72 195->205 196->174 206 403f86-403f90 196->206 205->186 206->205 213 404151-404152 209->213 214 404154 209->214 210->209 215 404156-404184 GetSystemMenu EnableMenuItem SendMessageW 213->215 214->215 216 404186-404197 SendMessageW 215->216 217 404199 215->217 218 40419f-4041de call 404379 call 403e4c call 4063ee lstrlenW call 40642b SetWindowTextW call 401389 216->218 217->218 218->157 229 4041e4-4041e6 218->229 229->157 230 4041ec-4041f0 229->230 231 4041f2-4041f8 230->231 232 40420f-404223 DestroyWindow 230->232 231->156 233 4041fe-404204 231->233 232->165 234 404229-404256 CreateDialogParamW 232->234 233->157 235 40420a 233->235 234->165 236 40425c-4042b3 call 404344 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 234->236 235->156 236->156 241 4042b5-4042c8 ShowWindow call 404390 236->241 243 4042cd 241->243 243->165
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA7
                            • ShowWindow.USER32(?), ref: 00403EC4
                            • DestroyWindow.USER32 ref: 00403ED8
                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF4
                            • GetDlgItem.USER32(?,?), ref: 00403F15
                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F29
                            • IsWindowEnabled.USER32(00000000), ref: 00403F30
                            • GetDlgItem.USER32(?,00000001), ref: 00403FDE
                            • GetDlgItem.USER32(?,00000002), ref: 00403FE8
                            • SetClassLongW.USER32(?,000000F2,?), ref: 00404002
                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404053
                            • GetDlgItem.USER32(?,00000003), ref: 004040F9
                            • ShowWindow.USER32(00000000,?), ref: 0040411A
                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040412C
                            • EnableWindow.USER32(?,?), ref: 00404147
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415D
                            • EnableMenuItem.USER32(00000000), ref: 00404164
                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417C
                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040418F
                            • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004041B9
                            • SetWindowTextW.USER32(?,007A1F48), ref: 004041CD
                            • ShowWindow.USER32(?,0000000A), ref: 00404301
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                            • String ID:
                            • API String ID: 3282139019-0
                            • Opcode ID: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                            • Instruction ID: fd8a01c06953bfbcdc6c7a7ca4fde1a241a6ed83f8ebcdeac2000881ab9a06ac
                            • Opcode Fuzzy Hash: f1a328e51306031731dbcce9d1c3737ebdd7014b04a9a2d8d616989602e21706
                            • Instruction Fuzzy Hash: 67C1BFB1604604AFDB206F61ED85D2A3B78EBCA705B10853EF651B11F0CB3D9941DB6E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 244 403abd-403ad5 call 4067e3 247 403ad7-403ae7 call 406335 244->247 248 403ae9-403b20 call 4062bc 244->248 257 403b43-403b6c call 403d93 call 405dcb 247->257 252 403b22-403b33 call 4062bc 248->252 253 403b38-403b3e lstrcatW 248->253 252->253 253->257 262 403b72-403b77 257->262 263 403bfe-403c06 call 405dcb 257->263 262->263 264 403b7d-403ba5 call 4062bc 262->264 268 403c14-403c39 LoadImageW 263->268 269 403c08-403c0f call 40642b 263->269 264->263 271 403ba7-403bab 264->271 273 403cba-403cc2 call 40140b 268->273 274 403c3b-403c6b RegisterClassW 268->274 269->268 275 403bbd-403bc9 lstrlenW 271->275 276 403bad-403bba call 405cf0 271->276 287 403cc4-403cc7 273->287 288 403ccc-403cd7 call 403d93 273->288 277 403c71-403cb5 SystemParametersInfoW CreateWindowExW 274->277 278 403d89 274->278 282 403bf1-403bf9 call 405cc3 call 4063ee 275->282 283 403bcb-403bd9 lstrcmpiW 275->283 276->275 277->273 281 403d8b-403d92 278->281 282->263 283->282 286 403bdb-403be5 GetFileAttributesW 283->286 290 403be7-403be9 286->290 291 403beb-403bec call 405d0f 286->291 287->281 297 403d60-403d68 call 405529 288->297 298 403cdd-403cf7 ShowWindow call 406773 288->298 290->282 290->291 291->282 305 403d82-403d84 call 40140b 297->305 306 403d6a-403d70 297->306 303 403d03-403d15 GetClassInfoW 298->303 304 403cf9-403cfe call 406773 298->304 309 403d17-403d27 GetClassInfoW RegisterClassW 303->309 310 403d2d-403d50 DialogBoxParamW call 40140b 303->310 304->303 305->278 306->287 311 403d76-403d7d call 40140b 306->311 309->310 314 403d55-403d5e call 403a0d 310->314 311->287 314->281
                            APIs
                              • Part of subcall function 004067E3: GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                              • Part of subcall function 004067E3: GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                            • lstrcatW.KERNEL32(1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",00000000), ref: 00403B3E
                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,75923420), ref: 00403BBE
                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403BD1
                            • GetFileAttributesW.KERNEL32(Call), ref: 00403BDC
                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods), ref: 00403C25
                              • Part of subcall function 00406335: wsprintfW.USER32 ref: 00406342
                            • RegisterClassW.USER32(007A7A00), ref: 00403C62
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7A
                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CAF
                            • ShowWindow.USER32(00000005,00000000), ref: 00403CE5
                            • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403D11
                            • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403D1E
                            • RegisterClassW.USER32(007A7A00), ref: 00403D27
                            • DialogBoxParamW.USER32(?,00000000,00403E6B,00000000), ref: 00403D46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\PO.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\struldbrug\bentwoods$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                            • API String ID: 1975747703-2852440508
                            • Opcode ID: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                            • Instruction ID: 7ce8ec14a48fa11d69b3a5e1f0875b7083b8d607cd9ed6182ea3b60f82ca9994
                            • Opcode Fuzzy Hash: ed5882197ad2af45622ab53baadaf8c7f939305731a510e2915a0577b65485f7
                            • Instruction Fuzzy Hash: 286193702407007ED320AB669D46F2B3A7CEB85B49F40853FF941B22E2DB7D99018B6D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 318 403015-403063 GetTickCount GetModuleFileNameW call 405ee4 321 403065-40306a 318->321 322 40306f-40309d call 4063ee call 405d0f call 4063ee GetFileSize 318->322 323 403245-403249 321->323 330 4030a3 322->330 331 403188-403196 call 402fb1 322->331 332 4030a8-4030bf 330->332 337 403198-40319b 331->337 338 4031eb-4031f0 331->338 334 4030c1 332->334 335 4030c3-4030cc call 403444 332->335 334->335 344 4031f2-4031fa call 402fb1 335->344 345 4030d2-4030d9 335->345 340 40319d-4031b5 call 40345a call 403444 337->340 341 4031bf-4031e9 GlobalAlloc call 40345a call 40324c 337->341 338->323 340->338 364 4031b7-4031bd 340->364 341->338 369 4031fc-40320d 341->369 344->338 348 403155-403159 345->348 349 4030db-4030ef call 405e9f 345->349 353 403163-403169 348->353 354 40315b-403162 call 402fb1 348->354 349->353 367 4030f1-4030f8 349->367 360 403178-403180 353->360 361 40316b-403175 call 4068d0 353->361 354->353 360->332 368 403186 360->368 361->360 364->338 364->341 367->353 373 4030fa-403101 367->373 368->331 370 403215-40321a 369->370 371 40320f 369->371 374 40321b-403221 370->374 371->370 373->353 375 403103-40310a 373->375 374->374 376 403223-40323e SetFilePointer call 405e9f 374->376 375->353 377 40310c-403113 375->377 380 403243 376->380 377->353 379 403115-403135 377->379 379->338 381 40313b-40313f 379->381 380->323 382 403141-403145 381->382 383 403147-40314f 381->383 382->368 382->383 383->353 384 403151-403153 383->384 384->353
                            APIs
                            • GetTickCount.KERNEL32 ref: 00403026
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PO.exe,00000400,?,00000007,00000009,0000000B), ref: 00403042
                              • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                              • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                            • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 0040308E
                            • GlobalAlloc.KERNELBASE(00000040,0000000B,?,00000007,00000009,0000000B), ref: 004031C4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PO.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                            • API String ID: 2803837635-3543905909
                            • Opcode ID: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                            • Instruction ID: b65d07b499067b34cf8ea267e223a71d0fae98adc47698ec1498b1efb03bef53
                            • Opcode Fuzzy Hash: 08ca265c2c11c7ade98783a519f9a0a5c073a42a03571b96a4881a179354b053
                            • Instruction Fuzzy Hash: DD51D171900204ABDB119F64DD85B9E7EACEB45316F20843BE911BA2D1DB7C8F418B5D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 449 40642b-406436 450 406438-406447 449->450 451 406449-40645f 449->451 450->451 452 406465-406472 451->452 453 406677-40667d 451->453 452->453 454 406478-40647f 452->454 455 406683-40668e 453->455 456 406484-406491 453->456 454->453 458 406690-406694 call 4063ee 455->458 459 406699-40669a 455->459 456->455 457 406497-4064a3 456->457 460 406664 457->460 461 4064a9-4064e7 457->461 458->459 465 406672-406675 460->465 466 406666-406670 460->466 463 406607-40660b 461->463 464 4064ed-4064f8 461->464 469 40660d-406613 463->469 470 40663e-406642 463->470 467 406511 464->467 468 4064fa-4064ff 464->468 465->453 466->453 476 406518-40651f 467->476 468->467 473 406501-406504 468->473 474 406623-40662f call 4063ee 469->474 475 406615-406621 call 406335 469->475 471 406651-406662 lstrlenW 470->471 472 406644-40664c call 40642b 470->472 471->453 472->471 473->467 479 406506-406509 473->479 485 406634-40663a 474->485 475->485 481 406521-406523 476->481 482 406524-406526 476->482 479->467 486 40650b-40650f 479->486 481->482 483 406561-406564 482->483 484 406528-406546 call 4062bc 482->484 490 406574-406577 483->490 491 406566-406572 GetSystemDirectoryW 483->491 492 40654b-40654f 484->492 485->471 489 40663c 485->489 486->476 493 4065ff-406605 call 40669d 489->493 495 4065e2-4065e4 490->495 496 406579-406587 GetWindowsDirectoryW 490->496 494 4065e6-4065ea 491->494 497 406555-40655c call 40642b 492->497 498 4065ef-4065f2 492->498 493->471 494->493 500 4065ec 494->500 495->494 499 406589-406593 495->499 496->495 497->494 498->493 503 4065f4-4065fa lstrcatW 498->503 505 406595-406598 499->505 506 4065ad-4065c3 SHGetSpecialFolderLocation 499->506 500->498 503->493 505->506 510 40659a-4065a1 505->510 507 4065c5-4065dc SHGetPathFromIDListW CoTaskMemFree 506->507 508 4065de 506->508 507->494 507->508 508->495 511 4065a9-4065ab 510->511 511->494 511->506
                            APIs
                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040656C
                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 0040657F
                            • SHGetSpecialFolderLocation.SHELL32(0040548D,0079A700,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 004065BB
                            • SHGetPathFromIDListW.SHELL32(0079A700,Call), ref: 004065C9
                            • CoTaskMemFree.OLE32(0079A700), ref: 004065D4
                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065FA
                            • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,0040548D,007A0F28,00000000), ref: 00406652
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                            • API String ID: 717251189-1230650788
                            • Opcode ID: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                            • Instruction ID: 6a9894c1754425a34e634a53c322024ca71031740d406166b65bc8419ebad360
                            • Opcode Fuzzy Hash: aaa997f56c542f4584990acf2269000a5d9ad94e2d12eeb77129bcfb95bdb2f4
                            • Instruction Fuzzy Hash: A261F471600505ABDF249F24DD40ABE37A5AF51318F22813FE543BA2D4DB3D8AA1CB5E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 512 405456-40546b 513 405471-405482 512->513 514 405522-405526 512->514 515 405484-405488 call 40642b 513->515 516 40548d-405499 lstrlenW 513->516 515->516 518 4054b6-4054ba 516->518 519 40549b-4054ab lstrlenW 516->519 520 4054c9-4054cd 518->520 521 4054bc-4054c3 SetWindowTextW 518->521 519->514 522 4054ad-4054b1 lstrcatW 519->522 523 405513-405515 520->523 524 4054cf-405511 SendMessageW * 3 520->524 521->520 522->518 523->514 525 405517-40551a 523->525 524->523 525->514
                            APIs
                            • lstrlenW.KERNEL32(007A0F28,00000000,0079A700,759223A0,?,?,?,?,?,?,?,?,?,0040338D,00000000,?), ref: 0040548E
                            • lstrlenW.KERNEL32(0040338D,007A0F28,00000000,0079A700,759223A0,?,?,?,?,?,?,?,?,?,0040338D,00000000), ref: 0040549E
                            • lstrcatW.KERNEL32(007A0F28,0040338D,0040338D,007A0F28,00000000,0079A700,759223A0), ref: 004054B1
                            • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004054C3
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054E9
                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405503
                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405511
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                            • Instruction ID: 198c43ce2186877ab3aec1728abe16fb3d15ea5683a6b9ae92d40c5f72e5eea1
                            • Opcode Fuzzy Hash: 0decb5d3bd7311ee25dcb4cac47719bdc9880b480b93dcede20cbb014160680e
                            • Instruction Fuzzy Hash: EC21AF75900518BACB119F65DD44ACFBFB9EF89354F10802AF904B22A1C3798A81CFA8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 526 405925-405970 CreateDirectoryW 527 405972-405974 526->527 528 405976-405983 GetLastError 526->528 529 40599d-40599f 527->529 528->529 530 405985-405999 SetFileSecurityW 528->530 530->527 531 40599b GetLastError 530->531 531->529
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405968
                            • GetLastError.KERNEL32 ref: 0040597C
                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405991
                            • GetLastError.KERNEL32 ref: 0040599B
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040594B
                            • C:\Users\user\Desktop, xrefs: 00405925
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                            • API String ID: 3449924974-1521822154
                            • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction ID: 4c6d3c4ce34384c56ae6b54862a6db5cebbf8231f9905efb0a53c4272bf1951e
                            • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                            • Instruction Fuzzy Hash: E1011AB1C00219EADF009FA5DD44BEFBBB8EF04314F00803AD544B6190E7789648CFA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 532 406773-406793 GetSystemDirectoryW 533 406795 532->533 534 406797-406799 532->534 533->534 535 4067aa-4067ac 534->535 536 40679b-4067a4 534->536 538 4067ad-4067e0 wsprintfW LoadLibraryExW 535->538 536->535 537 4067a6-4067a8 536->537 537->538
                            APIs
                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                            • wsprintfW.USER32 ref: 004067C5
                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%S.dll$UXTHEME$\
                            • API String ID: 2200240437-1946221925
                            • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction ID: 038d7fed81a94acb9f8d17f6b302bf2205b26bc145b48260013954e6d266918a
                            • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                            • Instruction Fuzzy Hash: 65F0F670510119A7CF14AB64DD0DF9B376CAB40309F10047AA646F20D0EB7C9A68CBA8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 539 40324c-403263 540 403265 539->540 541 40326c-403275 539->541 540->541 542 403277 541->542 543 40327e-403283 541->543 542->543 544 403293-4032a0 call 403444 543->544 545 403285-40328e call 40345a 543->545 549 403432 544->549 550 4032a6-4032aa 544->550 545->544 551 403434-403435 549->551 552 4032b0-4032d6 GetTickCount 550->552 553 4033dd-4033df 550->553 556 40343d-403441 551->556 557 40343a 552->557 558 4032dc-4032e4 552->558 554 4033e1-4033e4 553->554 555 40341f-403422 553->555 554->557 563 4033e6 554->563 561 403424 555->561 562 403427-403430 call 403444 555->562 557->556 559 4032e6 558->559 560 4032e9-4032f7 call 403444 558->560 559->560 560->549 572 4032fd-403306 560->572 561->562 562->549 573 403437 562->573 566 4033e9-4033ef 563->566 569 4033f1 566->569 570 4033f3-403401 call 403444 566->570 569->570 570->549 576 403403-40340f call 405f96 570->576 575 40330c-40332c call 40693e 572->575 573->557 581 403332-403345 GetTickCount 575->581 582 4033d5-4033d7 575->582 583 403411-40341b 576->583 584 4033d9-4033db 576->584 585 403390-403392 581->585 586 403347-40334f 581->586 582->551 583->566 587 40341d 583->587 584->551 590 403394-403398 585->590 591 4033c9-4033cd 585->591 588 403351-403355 586->588 589 403357-403388 MulDiv wsprintfW call 405456 586->589 587->557 588->585 588->589 598 40338d 589->598 592 40339a-4033a1 call 405f96 590->592 593 4033af-4033ba 590->593 591->558 594 4033d3 591->594 599 4033a6-4033a8 592->599 597 4033bd-4033c1 593->597 594->557 597->575 600 4033c7 597->600 598->585 599->584 601 4033aa-4033ad 599->601 600->557 601->597
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: ... %d%%
                            • API String ID: 551687249-2449383134
                            • Opcode ID: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                            • Instruction ID: 008436f450556a42ebae23d461066e9f0811e1f15f23a2ec19415b9062137ceb
                            • Opcode Fuzzy Hash: a56becbd4a8c381964fcf942c118294a751433144615ef02c1157a4186d243db
                            • Instruction Fuzzy Hash: 86516C71900219DBDB11DF65DA84B9F7FB8AF0076AF14417BE814B72C1C7789A40CBAA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 602 405f13-405f1f 603 405f20-405f54 GetTickCount GetTempFileNameW 602->603 604 405f63-405f65 603->604 605 405f56-405f58 603->605 607 405f5d-405f60 604->607 605->603 606 405f5a 605->606 606->607
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405F31
                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\PO.exe",004034A0,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC), ref: 00405F4C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\Desktop\PO.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-2702740349
                            • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction ID: 2ec416300cd5d099b763d3688cd3c506487cb406e2025687db32897a35dea38d
                            • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                            • Instruction Fuzzy Hash: 84F09676B00204BBDB008F55ED05E9FB7ACEB95750F10803AEA04F7140E6B499548B58

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 608 73471777-734717b6 call 73471b5f 612 734718d6-734718d8 608->612 613 734717bc-734717c0 608->613 614 734717c2-734717c8 call 7347239e 613->614 615 734717c9-734717d6 call 734723e0 613->615 614->615 620 73471806-7347180d 615->620 621 734717d8-734717dd 615->621 622 7347180f-7347182b call 734725b5 call 734715b4 call 73471272 GlobalFree 620->622 623 7347182d-73471831 620->623 624 734717df-734717e0 621->624 625 734717f8-734717fb 621->625 648 73471885-73471889 622->648 626 73471833-7347187c call 734715c6 call 734725b5 623->626 627 7347187e-73471884 call 734725b5 623->627 630 734717e2-734717e3 624->630 631 734717e8-734717e9 call 73472af8 624->631 625->620 628 734717fd-734717fe call 73472d83 625->628 626->648 627->648 641 73471803 628->641 636 734717e5-734717e6 630->636 637 734717f0-734717f6 call 73472770 630->637 644 734717ee 631->644 636->620 636->631 647 73471805 637->647 641->647 644->641 647->620 651 734718c6-734718cd 648->651 652 7347188b-73471899 call 73472578 648->652 651->612 654 734718cf-734718d0 GlobalFree 651->654 658 734718b1-734718b8 652->658 659 7347189b-7347189e 652->659 654->612 658->651 660 734718ba-734718c5 call 7347153d 658->660 659->658 661 734718a0-734718a8 659->661 660->651 661->658 663 734718aa-734718ab FreeLibrary 661->663 663->658
                            APIs
                              • Part of subcall function 73471B5F: GlobalFree.KERNEL32(?), ref: 73471DD4
                              • Part of subcall function 73471B5F: GlobalFree.KERNEL32(?), ref: 73471DD9
                              • Part of subcall function 73471B5F: GlobalFree.KERNEL32(?), ref: 73471DDE
                            • GlobalFree.KERNEL32(00000000), ref: 73471825
                            • FreeLibrary.KERNEL32(?), ref: 734718AB
                            • GlobalFree.KERNELBASE(00000000), ref: 734718D0
                              • Part of subcall function 7347239E: GlobalAlloc.KERNEL32(00000040,?), ref: 734723CF
                              • Part of subcall function 73472770: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,734717F6,00000000), ref: 73472840
                              • Part of subcall function 734715C6: wsprintfW.USER32 ref: 734715F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarywsprintf
                            • String ID:
                            • API String ID: 3962662361-3916222277
                            • Opcode ID: fd66f697d77e5f243521f388f415d2cd0d6c5cea1758e83dd2dca8cb21343012
                            • Instruction ID: 98f6be917d05ec4fbd9f8bb44c1978bae42b894c04ac91e0f01cdb33b0d0b370
                            • Opcode Fuzzy Hash: fd66f697d77e5f243521f388f415d2cd0d6c5cea1758e83dd2dca8cb21343012
                            • Instruction Fuzzy Hash: C741AF72500349DBEB1D9F709984BD637FCFB04351F184569E94BAE2C6DBB88088C7A8

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 665 405dcb-405de6 call 4063ee call 405d6e 670 405de8-405dea 665->670 671 405dec-405df9 call 40669d 665->671 672 405e44-405e46 670->672 675 405e09-405e0d 671->675 676 405dfb-405e01 671->676 678 405e23-405e2c lstrlenW 675->678 676->670 677 405e03-405e07 676->677 677->670 677->675 679 405e2e-405e42 call 405cc3 GetFileAttributesW 678->679 680 405e0f-405e16 call 40674c 678->680 679->672 685 405e18-405e1b 680->685 686 405e1d-405e1e call 405d0f 680->686 685->670 685->686 686->678
                            APIs
                              • Part of subcall function 004063EE: lstrcpynW.KERNEL32(?,?,00000400,00403573,007A7A60,NSIS Error,?,00000007,00000009,0000000B), ref: 004063FB
                              • Part of subcall function 00405D6E: CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                              • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D81
                              • Part of subcall function 00405D6E: CharNextW.USER32(00000000), ref: 00405D99
                            • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E24
                            • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405E34
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                            • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 3248276644-1964270705
                            • Opcode ID: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                            • Instruction ID: 3e737dd218ce82e1fa1fef2ae0b63742eeb13cb079fe623d21add3619189c6ea
                            • Opcode Fuzzy Hash: cded0a6966890639b687aa66a4455a295a884498cbe0599bea4925404aa51844
                            • Instruction Fuzzy Hash: B2F0A435104E5115D632333A9D09BEF1558CE86718B19863BF8A2B22D2DB3C8A539DBE

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 688 4062bc-4062ee call 40625b 691 4062f0-40631e RegQueryValueExW RegCloseKey 688->691 692 40632c 688->692 691->692 693 406320-406324 691->693 694 406330-406332 692->694 693->694 695 406326-40632a 693->695 695->692 695->694
                            APIs
                            • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000002,007A0F28,00000000,?,?,Call,?,?,0040654B,80000002), ref: 00406302
                            • RegCloseKey.KERNELBASE(?,?,0040654B,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F28), ref: 0040630D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: Call
                            • API String ID: 3356406503-1824292864
                            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                            • Instruction ID: 373679b9ec00f947e58de2b720fd419a4882b2706591ab80caa015ae1ce90e84
                            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                            • Instruction Fuzzy Hash: 56017C72510209EADF218F65CC09EDB3BA8FF54364F01803AFD5AA2190D778D964DBA4

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 696 4059d7-405a08 CreateProcessW 697 405a16-405a17 696->697 698 405a0a-405a13 CloseHandle 696->698 698->697
                            APIs
                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F50,Error launching installer), ref: 00405A00
                            • CloseHandle.KERNEL32(?), ref: 00405A0D
                            Strings
                            • Error launching installer, xrefs: 004059EA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                            • Instruction ID: 2b341ff16c6abf5d503a25303b32c86a9a78efd9c2a610832e0bce27d8c53e5f
                            • Opcode Fuzzy Hash: c4e46f1f673fd3826d078202ae771a3f9877dbb6e8e98e36d3575ddcb335b3d8
                            • Instruction Fuzzy Hash: F3E0BFF46002097FEB109F64ED05F7B77ACEB44644F004525BD54F6150D7B999148A7D
                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                            • Instruction ID: 3e9f44f44444eb33be3e1f1d809517d1ef13f380758e007b8d3e22890c14ce30
                            • Opcode Fuzzy Hash: 450ddb0a52dde23e6c3e7e65707e0a17b99b7c6dada291b67ac9213214883537
                            • Instruction Fuzzy Hash: 0301F432624220ABE7195B389D05B2A3698E751318F10C13FF855F6AF1EA78CC02DB4D
                            APIs
                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403514,0000000B), ref: 004067F5
                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406810
                              • Part of subcall function 00406773: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040678A
                              • Part of subcall function 00406773: wsprintfW.USER32 ref: 004067C5
                              • Part of subcall function 00406773: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 004067D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                            • Instruction ID: 99a4bc67a8c43757839ce5658996565e88f4cb2ecc15aeea03f34014f97f3c52
                            • Opcode Fuzzy Hash: 04b739db586b670126c7119b566f03dd1efc4ec82adb23a6bbf3e60323b3d7ce
                            • Instruction Fuzzy Hash: F2E0863350521056E611AA719D44C7773AC9F89650307843EF946F2080D738DC31ABBD
                            APIs
                            • GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                            • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                            • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                            • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,00000000,00403495,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 004059A8
                            • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 004059B6
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                            • Instruction ID: 379133542b1e1e7011c0d69b4b2ae41cc98c6aec5a22f3063a42931ced3e53c7
                            • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                            • Instruction Fuzzy Hash: 1EC04C71205502EEF6115B20DF48B1B7A909B50751F16843DA146E01E4DE389455D92D
                            APIs
                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403457,00000000,00000000,0040329E,?,00000004,00000000,00000000,00000000), ref: 00405F7B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                            • Instruction ID: e146fa180a083be72d256ad1b428d57881e9eb39a1326beaade4420b40277b6a
                            • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                            • Instruction Fuzzy Hash: E7E0EC3221065BAFDF10AEA59C04EFB7B6CEB05360F004836FD55E6150D635E9219BA8
                            APIs
                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040340D,000000FF,00793700,?,00793700,?,?,00000004,00000000), ref: 00405FAA
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                            • Instruction ID: df8aade711aef2fea4c6cc03ed90c08959c6261ddae8de931081f7d2433cde5f
                            • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                            • Instruction Fuzzy Hash: 96E08C3221021AEBDF109E608C00AEB7B6CEB00360F004433FA24E3150D634E8218BA8
                            APIs
                            • VirtualProtect.KERNELBASE(7347505C,00000004,00000040,7347504C), ref: 734729FD
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: d1f99a19aaa2913472e988d89cfd0011bc755184f41912cacac2d584780cf521
                            • Instruction ID: ba1a6b3fc85c5d9e446c500acc23993e17a54aeba565a745f3121b161cf1d4c9
                            • Opcode Fuzzy Hash: d1f99a19aaa2913472e988d89cfd0011bc755184f41912cacac2d584780cf521
                            • Instruction Fuzzy Hash: 1DF0AEF2A002C0DED358EF2A8444B493BE0F70A304B3445AAE19CFE282E3344044CFA5
                            APIs
                            • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,007A0F28,?,?,004062E9,007A0F28,00000000,?,?,Call,?), ref: 0040627F
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                            • Instruction ID: 981b209bfbc59ad728c3152e24748ded8346fc425447e23afb42b8d85bc6dac1
                            • Opcode Fuzzy Hash: dcd566976f3bef00ddda20b11fb2537fa700d8cbfb920dfffbe2909342267143
                            • Instruction Fuzzy Hash: 35D0123200020DBBDF11AF90ED05FAB372DAB08350F014426FE06A4091D775D530A728
                            APIs
                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A2
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                            • Instruction ID: 2ab46fc48b107f7ec410a0490fc1e10939948660fe742cc14426a6f165494095
                            • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                            • Instruction Fuzzy Hash: 26C04C75784700BADA149B549E45F0677546B90701F158429B641A50D0CA78D410DA2C
                            APIs
                            • SetFilePointer.KERNELBASE(?,00000000,00000000,004031DA,?,?,00000007,00000009,0000000B), ref: 00403468
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                            • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                            • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                            • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                            APIs
                            • SendMessageW.USER32(00000028,?,00000001,004041A4), ref: 00404387
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                            • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                            • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                            • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                            APIs
                            • KiUserCallbackDispatcher.NTDLL(?,0040413D), ref: 00404370
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CallbackDispatcherUser
                            • String ID:
                            • API String ID: 2492992576-0
                            • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                            • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                            • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                            • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                            APIs
                            • VirtualAlloc.KERNELBASE(00000000), ref: 73472BB7
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 08594b92f797916f1d53f72a4693093e857a7a4710d8977ed2d6fefb20e63787
                            • Instruction ID: bc2002a54566b4ee7bc78385350eaaa89e73dc87bf5d83ef283e80db04169b8f
                            • Opcode Fuzzy Hash: 08594b92f797916f1d53f72a4693093e857a7a4710d8977ed2d6fefb20e63787
                            • Instruction Fuzzy Hash: 9641A2B280034CEFEB2DEF65D984BDA37B9FB05310F3084A9E509EA250D63595818BD9
                            APIs
                            • GlobalAlloc.KERNELBASE(00000040,?,7347123B,?,734712DF,00000019,734711BE,-000000A0), ref: 73471225
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: AllocGlobal
                            • String ID:
                            • API String ID: 3761449716-0
                            • Opcode ID: e3b9cab75e3d689cd283f6b4488b05d9cf18d42f46f6812d14b865d4df20b704
                            • Instruction ID: 6badc774738576bd431960dbfd39f2562c1d3be8dcccc707bbc726b52303f594
                            • Opcode Fuzzy Hash: e3b9cab75e3d689cd283f6b4488b05d9cf18d42f46f6812d14b865d4df20b704
                            • Instruction Fuzzy Hash: F2B012B2A00040DFEE04AB65CD06F3432D4E700301F144040F608F4280C22048008534
                            APIs
                              • Part of subcall function 7347121B: GlobalAlloc.KERNELBASE(00000040,?,7347123B,?,734712DF,00000019,734711BE,-000000A0), ref: 73471225
                            • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 73471C8D
                            • lstrcpyW.KERNEL32(00000008,?), ref: 73471CD5
                            • lstrcpyW.KERNEL32(00000808,?), ref: 73471CDF
                            • GlobalFree.KERNEL32(00000000), ref: 73471CF2
                            • GlobalFree.KERNEL32(?), ref: 73471DD4
                            • GlobalFree.KERNEL32(?), ref: 73471DD9
                            • GlobalFree.KERNEL32(?), ref: 73471DDE
                            • GlobalFree.KERNEL32(00000000), ref: 73471FC8
                            • lstrcpyW.KERNEL32(?,?), ref: 73472182
                            • GetModuleHandleW.KERNEL32(00000008), ref: 73472201
                            • LoadLibraryW.KERNEL32(00000008), ref: 73472212
                            • GetProcAddress.KERNEL32(?,?), ref: 7347226C
                            • lstrlenW.KERNEL32(00000808), ref: 73472286
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                            • String ID:
                            • API String ID: 245916457-0
                            • Opcode ID: febb65345bc9c7e98f466b96ee510c84395ff65d81b3e08dc2148d717cf1dd96
                            • Instruction ID: e64f24dbb401b439408b492a57af744eebeb75ad4fc3cb3a69f30737fee38293
                            • Opcode Fuzzy Hash: febb65345bc9c7e98f466b96ee510c84395ff65d81b3e08dc2148d717cf1dd96
                            • Instruction Fuzzy Hash: 4D22AB71D0024ADFDB29CFA4C5807EEB7F5FB08315F14452ED1A6E6280D7709A82CB58
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004061D5,00000000,00000000), ref: 00406075
                            • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 0040607E
                              • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                              • Part of subcall function 00405E49: lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                            • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 0040609B
                            • wsprintfA.USER32 ref: 004060B9
                            • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?), ref: 004060F4
                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406103
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040613B
                            • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 00406191
                            • GlobalFree.KERNEL32(00000000), ref: 004061A2
                            • CloseHandle.KERNEL32(00000000), ref: 004061A9
                              • Part of subcall function 00405EE4: GetFileAttributesW.KERNELBASE(?,00403055,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405EE8
                              • Part of subcall function 00405EE4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000007,00000009,0000000B), ref: 00405F0A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %ls=%ls$[Rename]$Uz$]z
                            • API String ID: 2171350718-2939442745
                            • Opcode ID: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                            • Instruction ID: 03fe7b931bffc2b02635af9c10f4e714808f3729e90155368a1b4a6ed52067ca
                            • Opcode Fuzzy Hash: 0ed23fd09f20e9f0b0e4ce5e0ebdd9c0c92abb0a06c9999cd82c312b58dee0fa
                            • Instruction Fuzzy Hash: 44312370600B05BFD6206B618D48F6B3A6CDF86744F15013AFD42FA2C3DA3C99218ABD
                            APIs
                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406700
                            • CharNextW.USER32(?,?,?,00000000,?,00000007,00000009,0000000B), ref: 0040670F
                            • CharNextW.USER32(?,00000000,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406714
                            • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO.exe",0040347D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00406727
                            Strings
                            • "C:\Users\user\Desktop\PO.exe", xrefs: 0040669D
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040669E
                            • *?|<>/":, xrefs: 004066EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\PO.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-3565438589
                            • Opcode ID: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                            • Instruction ID: 12c80e2bf748d1a62cb3884e1ae38c2d534281e125f75e63bd15dfe73c9398b2
                            • Opcode Fuzzy Hash: 9ddbb9e18cbe24282ce487244f484090ca5dfb24375496ba9be4fccf49263134
                            • Instruction Fuzzy Hash: E711EB15800A1255DB303B148C84A7763F8EF947A4F56443FED86732C0E77D4C9286BD
                            APIs
                            • GetWindowLongW.USER32(?,000000EB), ref: 004043C8
                            • GetSysColor.USER32(00000000), ref: 00404406
                            • SetTextColor.GDI32(?,00000000), ref: 00404412
                            • SetBkMode.GDI32(?,?), ref: 0040441E
                            • GetSysColor.USER32(?), ref: 00404431
                            • SetBkColor.GDI32(?,?), ref: 00404441
                            • DeleteObject.GDI32(?), ref: 0040445B
                            • CreateBrushIndirect.GDI32(?), ref: 00404465
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                            • Instruction ID: 7fe0b9bd09f79c55d2aa0e3576d5328f94b18663b05207f77db8afc097fd36db
                            • Opcode Fuzzy Hash: 288dbcc7c85f11a55b3e08142a2a7aff64d3670202badf385cb57de10b60d8c1
                            • Instruction Fuzzy Hash: F62174B15007049BCB319F78D948F5BBBF8AF80714B048A3EE9D2A26E1C734E905CB58
                            APIs
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,73472238,?,00000808), ref: 73471635
                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,73472238,?,00000808), ref: 7347163C
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,73472238,?,00000808), ref: 73471650
                            • GetProcAddress.KERNEL32(8"Gs,00000000), ref: 73471657
                            • GlobalFree.KERNEL32(00000000), ref: 73471660
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                            • String ID: 8"Gs
                            • API String ID: 1148316912-1495688344
                            • Opcode ID: 043a9ba5afd0ad5a7e42c985351c23eb0a97a7fc99fff98cc8cf97e2b1f35417
                            • Instruction ID: bd50724ae0fac79bc732580ef348433e4cbd66e9358433bc2671c7a92497757d
                            • Opcode Fuzzy Hash: 043a9ba5afd0ad5a7e42c985351c23eb0a97a7fc99fff98cc8cf97e2b1f35417
                            • Instruction Fuzzy Hash: F3F0AC732061787BD6212AA78C4CDABBE9CDF8B2F5B210615F62CA22A096615D01D7F1
                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402F49
                            • MulDiv.KERNEL32(000DED8A,00000064,000DF8B0), ref: 00402F74
                            • wsprintfW.USER32 ref: 00402F84
                            • SetWindowTextW.USER32(?,?), ref: 00402F94
                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402FA6
                            Strings
                            • verifying installer: %d%%, xrefs: 00402F7E
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                            • Instruction ID: 448c993359d53400b231c8c55bc41b2c2aaf26e1e6946bd82a433317a94b79bc
                            • Opcode Fuzzy Hash: e04d04eb7b63203ce5fd1c353c1d281d58231c4b0d3ff082bc1608e2171a15b6
                            • Instruction Fuzzy Hash: 1101FF70640209BBEF209F60DE4AFAA3B79EB04349F008039FA16A51D1DBB999559F58
                            APIs
                              • Part of subcall function 7347121B: GlobalAlloc.KERNELBASE(00000040,?,7347123B,?,734712DF,00000019,734711BE,-000000A0), ref: 73471225
                            • GlobalFree.KERNEL32(?), ref: 734726A3
                            • GlobalFree.KERNEL32(00000000), ref: 734726D8
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: bcc6f381feb44e871cfa9a9821aa4130576a22ad624285ed6f07f5a4759a426a
                            • Instruction ID: 8e61570be4ef881292802dc95360e6defc48a001469fba1bc841cdc676301f2b
                            • Opcode Fuzzy Hash: bcc6f381feb44e871cfa9a9821aa4130576a22ad624285ed6f07f5a4759a426a
                            • Instruction Fuzzy Hash: BD31E132604149EFD72E9F65CC84FAA77FAFB85304B24452EF205A7270C730A845CB69
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: FreeGlobal
                            • String ID:
                            • API String ID: 2979337801-0
                            • Opcode ID: 90fec8fe5dfdd09756fc99b2997b0f8973b1b510ec54b8ca12a6414f95c2315b
                            • Instruction ID: 7d2b221df881d2e64c22a0fadd5d9b8886778ffb335f9eb3c2d184b75fb7e78d
                            • Opcode Fuzzy Hash: 90fec8fe5dfdd09756fc99b2997b0f8973b1b510ec54b8ca12a6414f95c2315b
                            • Instruction Fuzzy Hash: C851C572D00159DFDB2F9FA48540BEEBBBAEB44350F18425AD406B3384D6709E828B9D
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 73472522
                              • Part of subcall function 7347122C: lstrcpynW.KERNEL32(00000000,?,734712DF,00000019,734711BE,-000000A0), ref: 7347123C
                            • GlobalAlloc.KERNEL32(00000040), ref: 734724A8
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 734724C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                            • String ID:
                            • API String ID: 4216380887-0
                            • Opcode ID: 8fd6d20768a7121cfa54219f9c48650c259b5f906e564ab6174eaee8ab62cafb
                            • Instruction ID: a7a72eebcb14c27a1bd07f7dd58cc21d136f76edd1a1819ae3d6aa891c4da426
                            • Opcode Fuzzy Hash: 8fd6d20768a7121cfa54219f9c48650c259b5f906e564ab6174eaee8ab62cafb
                            • Instruction Fuzzy Hash: FF41D0B1408349EFE71DEF65D844BA677F8FB48310F10491DE45AA7282DB30A545CBA9
                            APIs
                            • CharNextW.USER32(?,?,C:\,?,00405DE2,C:\,C:\,?,?,C:\Users\user\AppData\Local\Temp\,00405B20,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405D7C
                            • CharNextW.USER32(00000000), ref: 00405D81
                            • CharNextW.USER32(00000000), ref: 00405D99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CharNext
                            • String ID: C:\
                            • API String ID: 3213498283-3404278061
                            • Opcode ID: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                            • Instruction ID: 839f6a4cd7818f8bbcc29dd9d6e935739f9a8baf6e4a15472bca77c663bd0c43
                            • Opcode Fuzzy Hash: a494e05d27702b27be76eb2108b1f7c475580a471c546fdda9206c4fb56a95c9
                            • Instruction Fuzzy Hash: 1FF09022920F1296DB3177545C4DE7B5BB8EF54760B00C43BE601B72C1E3B84C818EAA
                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CC9
                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040348F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036EC,?,00000007,00000009,0000000B), ref: 00405CD3
                            • lstrcatW.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405CE5
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405CC3
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-823278215
                            • Opcode ID: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                            • Instruction ID: 20018de61182ae54b5e078598b4ece42ca391df12eccfc729252e8f5514d5294
                            • Opcode Fuzzy Hash: bed06d4f6a82b163f62297ef23baf12e7c7e8c5859eb2f34a161a285e0ec4316
                            • Instruction Fuzzy Hash: 78D0A731101A30AAD1117B448D04CDF629CFE85304341403BF202B30A2C77C1D5387FD
                            APIs
                            • DestroyWindow.USER32(00000000,00000000,0040318F,00000001,?,00000007,00000009,0000000B), ref: 00402FC4
                            • GetTickCount.KERNEL32 ref: 00402FE2
                            • CreateDialogParamW.USER32(0000006F,00000000,00402F2B,00000000), ref: 00402FFF
                            • ShowWindow.USER32(00000000,00000005,?,00000007,00000009,0000000B), ref: 0040300D
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                            • Instruction ID: 8c281f3aa7e88f802b7d8bba4993e69035ed424970cff038758a163d63a680ad
                            • Opcode Fuzzy Hash: 5e41244d60e94df7afa5422e741b36603cd51d1290bb4582c8306ab25b36019d
                            • Instruction Fuzzy Hash: 3AF0BE30506221ABC2616F60FE0CA8B3B78FB44B51705C83BF101F11E4CB3808819B9D
                            APIs
                            • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403A00,00403816,00000007,?,00000007,00000009,0000000B), ref: 00403A42
                            • GlobalFree.KERNEL32(00AE1E50), ref: 00403A49
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A28
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 1100898210-823278215
                            • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                            • Instruction ID: 10b089f61d7fd26560bcfb3f790e8945b6a0be01d7b58778b04adbc7300f8739
                            • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                            • Instruction Fuzzy Hash: 64E0123360112057C6215F45FE0475ABB7D6F49B26F06803BE9C0BB26087785C838FD8
                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D15
                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00403081,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO.exe,C:\Users\user\Desktop\PO.exe,80000000,00000003,?,00000007,00000009,0000000B), ref: 00405D25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-1246513382
                            • Opcode ID: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                            • Instruction ID: 3b4219a6871f3e4e2040e57eeeef2aaac809f1ec38f5d31038b50c09059f2d31
                            • Opcode Fuzzy Hash: ca28fb495e832aca3bc5bc38fa8d5a1d536c38e2997e226eadf599fe90d3b243
                            • Instruction Fuzzy Hash: 97D05EB34109209AE3127704DC0599F73E8EF5530074A8467E541A61A5D7785C818AAC
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 7347116A
                            • GlobalFree.KERNEL32(00000000), ref: 734711C7
                            • GlobalFree.KERNEL32(00000000), ref: 734711D9
                            • GlobalFree.KERNEL32(?), ref: 73471203
                            Memory Dump Source
                            • Source File: 00000000.00000002.2547859164.0000000073471000.00000020.00000001.01000000.00000006.sdmp, Offset: 73470000, based on PE: true
                            • Associated: 00000000.00000002.2547606703.0000000073470000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547902113.0000000073474000.00000002.00000001.01000000.00000006.sdmpDownload File
                            • Associated: 00000000.00000002.2547971403.0000000073476000.00000002.00000001.01000000.00000006.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73470000_PO.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 6e12b05bfb191b283c285a57f9ccf55da0a3e935f2a0225aae77dbc96e829328
                            • Instruction ID: 909f47f39045db463a7ca5c6a43b3d01a38f73339990059730897e9908649b94
                            • Opcode Fuzzy Hash: 6e12b05bfb191b283c285a57f9ccf55da0a3e935f2a0225aae77dbc96e829328
                            • Instruction Fuzzy Hash: 0F31A1B2900241DFE71C9F7AC945BA577FCFB49250B14056AE84AFF354EB34D8018BA8
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E59
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E71
                            • CharNextA.USER32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E82
                            • lstrlenA.KERNEL32(00000000,?,00000000,0040612E,00000000,[Rename],00000000,00000000,00000000), ref: 00405E8B
                            Memory Dump Source
                            • Source File: 00000000.00000002.2511382438.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.2511360584.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511405798.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511421319.00000000007DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.00000000007DE000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2511740008.000000000081E000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_PO.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction ID: a1795947179755a411c98c1569971d2b6f4e38ea7894d212e8297337e4f71977
                            • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                            • Instruction Fuzzy Hash: E2F06231504514FFD7129BA5DD409AEBBA8EF06250B2540BAE884FB250D674DF029BE9