Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO_203-25.exe

Overview

General Information

Sample name:PO_203-25.exe
Analysis ID:1562304
MD5:bcf1b4c359d89892cbdeddcac52fd4d7
SHA1:3c12d1efe6438fed0bcec88c23c5994c44066e43
SHA256:915903938dd1c51abd0f1e2f35e0fca67040694d9f5b1edd5825533a70a7269f
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PO_203-25.exe (PID: 7780 cmdline: "C:\Users\user\Desktop\PO_203-25.exe" MD5: BCF1B4C359D89892CBDEDDCAC52FD4D7)
    • PO_203-25.exe (PID: 7892 cmdline: "C:\Users\user\Desktop\PO_203-25.exe" MD5: BCF1B4C359D89892CBDEDDCAC52FD4D7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["192.3.176.134:7062:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9BZQTI", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.1666518967.0000000005060000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: PO_203-25.exe PID: 7892JoeSecurity_RemcosYara detected Remcos RATJoe Security

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\PO_203-25.exe, ProcessId: 7892, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-25T13:41:17.748952+010020365941Malware Command and Control Activity Detected192.168.2.349716192.3.176.1347062TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-25T13:41:20.399125+010028033043Unknown Traffic192.168.2.349717178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-25T13:40:57.582700+010028032702Potentially Bad Traffic192.168.2.349714172.67.200.96443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: PO_203-25.exeAvira: detected
              Source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["192.3.176.134:7062:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9BZQTI", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: PO_203-25.exeReversingLabs: Detection: 52%
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO_203-25.exe PID: 7892, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: PO_203-25.exeJoe Sandbox ML: detected
              Source: PO_203-25.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.200.96:443 -> 192.168.2.3:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.200.96:443 -> 192.168.2.3:49715 version: TLS 1.2
              Source: PO_203-25.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_00406010 FindFirstFileA,FindClose,0_2_00406010
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_004055AE GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055AE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.3:49716 -> 192.3.176.134:7062
              Source: Malware configuration extractorIPs: 192.3.176.134
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 172.67.200.96 172.67.200.96
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.3:49717 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.3:49714 -> 172.67.200.96:443
              Source: global trafficHTTP traffic detected: GET /data-package/NOvf4VgB/download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: filetransfer.ioCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /storage/download/XPjnDkLRpdfJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: s24.filetransfer.ioConnection: Keep-AliveCookie: nette-samesite=1; PHPSESSID=c9h6d86qa6anr7io6fkbvm0hi9
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownTCP traffic detected without corresponding DNS query: 192.3.176.134
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /data-package/NOvf4VgB/download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: filetransfer.ioCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /storage/download/XPjnDkLRpdfJ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: s24.filetransfer.ioConnection: Keep-AliveCookie: nette-samesite=1; PHPSESSID=c9h6d86qa6anr7io6fkbvm0hi9
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: filetransfer.io
              Source: global trafficDNS traffic detected: DNS query: s24.filetransfer.io
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1969571656.0000000003F3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1969571656.0000000003F3D000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp1
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpad
              Source: PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1969571656.0000000003F3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gprr;
              Source: PO_203-25.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: PO_203-25.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917723572.0000000003E00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/data-package/NOvf4VgB/download
              Source: PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/data-package/NOvf4VgB/download(
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/data-package/NOvf4VgB/download8
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://filetransfer.io/data-package/NOvf4VgB/downloadl
              Source: PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/
              Source: PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1741412605.0000000003EEB000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJ
              Source: PO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJR
              Source: PO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJX
              Source: PO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJ_
              Source: PO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJx
              Source: PO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s24.filetransfer.io/storage/downo
              Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
              Source: unknownHTTPS traffic detected: 172.67.200.96:443 -> 192.168.2.3:49714 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.200.96:443 -> 192.168.2.3:49715 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\PO_203-25.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\PO_203-25.exeJump to behavior

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO_203-25.exe PID: 7892, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: initial sampleStatic PE information: Filename: PO_203-25.exe
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_004030EC EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030EC
              Source: PO_203-25.exeStatic PE information: invalid certificate
              Source: PO_203-25.exe, 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesita strengeinstruments.exeP vs PO_203-25.exe
              Source: PO_203-25.exe, 00000003.00000002.3911312872.000000000080E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesita strengeinstruments.exeP vs PO_203-25.exe
              Source: PO_203-25.exeBinary or memory string: OriginalFilenamesita strengeinstruments.exeP vs PO_203-25.exe
              Source: PO_203-25.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/11@3/3
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_004030EC EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030EC
              Source: C:\Users\user\Desktop\PO_203-25.exeFile created: C:\Users\user\eksterirerneJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-9BZQTI
              Source: C:\Users\user\Desktop\PO_203-25.exeFile created: C:\Users\user\AppData\Local\Temp\nsi62BE.tmpJump to behavior
              Source: PO_203-25.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\PO_203-25.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PO_203-25.exeReversingLabs: Detection: 52%
              Source: C:\Users\user\Desktop\PO_203-25.exeFile read: C:\Users\user\Desktop\PO_203-25.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PO_203-25.exe "C:\Users\user\Desktop\PO_203-25.exe"
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess created: C:\Users\user\Desktop\PO_203-25.exe "C:\Users\user\Desktop\PO_203-25.exe"
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess created: C:\Users\user\Desktop\PO_203-25.exe "C:\Users\user\Desktop\PO_203-25.exe"Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: omprogrammeringernes.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: PO_203-25.exeStatic file information: File size 1135960 > 1048576
              Source: PO_203-25.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.1666518967.0000000005060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
              Source: C:\Users\user\Desktop\PO_203-25.exeFile created: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\PO_203-25.exeAPI/Special instruction interceptor: Address: 56067A9
              Source: C:\Users\user\Desktop\PO_203-25.exeAPI/Special instruction interceptor: Address: 21B67A9
              Source: C:\Users\user\Desktop\PO_203-25.exeRDTSC instruction interceptor: First address: 55AE022 second address: 55AE022 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FC7F137CDA7h 0x00000006 inc ebp 0x00000007 cmp ch, 00000067h 0x0000000a inc ebx 0x0000000b rdtsc
              Source: C:\Users\user\Desktop\PO_203-25.exeRDTSC instruction interceptor: First address: 215E022 second address: 215E022 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FC7F04F94C7h 0x00000006 inc ebp 0x00000007 cmp ch, 00000067h 0x0000000a inc ebx 0x0000000b rdtsc
              Source: C:\Users\user\Desktop\PO_203-25.exeWindow / User API: threadDelayed 1259Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeWindow / User API: threadDelayed 8229Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8148Thread sleep count: 219 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8148Thread sleep time: -109500s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8152Thread sleep count: 1259 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8152Thread sleep time: -3777000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8152Thread sleep count: 8229 > 30Jump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exe TID: 8152Thread sleep time: -24687000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_00406010 FindFirstFileA,FindClose,0_2_00406010
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_004055AE GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055AE
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\PO_203-25.exeAPI call chain: ExitProcess graph end nodegraph_0-2208
              Source: C:\Users\user\Desktop\PO_203-25.exeAPI call chain: ExitProcess graph end nodegraph_0-2420
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
              Source: C:\Users\user\Desktop\PO_203-25.exeProcess created: C:\Users\user\Desktop\PO_203-25.exe "C:\Users\user\Desktop\PO_203-25.exe"Jump to behavior
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerTI\t=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager134:7062
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerTI\7=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerY=
              Source: PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageryr>
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager<=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/L=
              Source: PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerTI\}=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/%=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
              Source: PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*r
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerk=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerTI\
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerb=
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, logs.dat.3.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\PO_203-25.exeCode function: 0_2_004030EC EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030EC

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO_203-25.exe PID: 7892, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\PO_203-25.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-9BZQTIJump to behavior
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: PO_203-25.exe PID: 7892, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              1
              Masquerading
              11
              Input Capture
              21
              Security Software Discovery
              Remote Services11
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts12
              Process Injection
              1
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Remote Access Software
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Access Token Manipulation
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets2
              File and Directory Discovery
              SSHKeylogging113
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials22
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PO_203-25.exe53%ReversingLabsWin32.Backdoor.Remcos
              PO_203-25.exe100%AviraHEUR/AGEN.1331786
              PO_203-25.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://s24.filetransfer.io/storage/downo0%Avira URL Cloudsafe
              https://s24.filetransfer.io/0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              s24.filetransfer.io
              172.67.200.96
              truefalse
                high
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  filetransfer.io
                  172.67.200.96
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpfalse
                      high
                      https://filetransfer.io/data-package/NOvf4VgB/downloadfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://filetransfer.io/PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/json.gprr;PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1969571656.0000000003F3D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorPO_203-25.exefalse
                              high
                              http://geoplugin.net/PO_203-25.exe, 00000003.00000002.3918024532.0000000003F40000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000003.1969571656.0000000003F3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://filetransfer.io/data-package/NOvf4VgB/downloadlPO_203-25.exe, 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://s24.filetransfer.io/PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://filetransfer.io/data-package/NOvf4VgB/download(PO_203-25.exe, 00000003.00000003.1741494737.0000000003EF0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://s24.filetransfer.io/storage/downoPO_203-25.exe, 00000003.00000003.1910013257.0000000003EEB000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://geoplugin.net/json.gp1PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmp, PO_203-25.exe, 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://nsis.sf.net/NSIS_ErrorErrorPO_203-25.exefalse
                                        high
                                        http://geoplugin.net/json.gpadPO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://filetransfer.io/data-package/NOvf4VgB/download8PO_203-25.exe, 00000003.00000002.3917775500.0000000003E77000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            172.67.200.96
                                            s24.filetransfer.ioUnited States
                                            13335CLOUDFLARENETUSfalse
                                            192.3.176.134
                                            unknownUnited States
                                            36352AS-COLOCROSSINGUStrue
                                            178.237.33.50
                                            geoplugin.netNetherlands
                                            8455ATOM86-ASATOM86NLfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1562304
                                            Start date and time:2024-11-25 13:39:15 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 8m 43s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:10
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:PO_203-25.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/11@3/3
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 53%
                                            • Number of executed functions: 30
                                            • Number of non-executed functions: 17
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                                            • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target PO_203-25.exe, PID 7892 because there are no executed function
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            • VT rate limit hit for: PO_203-25.exe
                                            TimeTypeDescription
                                            07:41:47API Interceptor4259676x Sleep call for process: PO_203-25.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            172.67.200.96B73X15Rsu7.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/mU5kQOzV/download
                                            QUOTATION_MAYQTRA031244#U00b7PDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/GWyzXjYcdownload
                                            Purchase Order No.P7696#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • filetransfer.io/data-package/Ep4Uq1sZ/download
                                            QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • filetransfer.io/data-package/ih7ujIri/download
                                            QUOTATION_APRQTRA031244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • filetransfer.io/data-package/ncyGKDgF/download
                                            DHL - OVERDUE ACCOUNT NOTICE -1301858139#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • filetransfer.io/data-package/brvisqCp/download
                                            ORDER_LIST_NOVQTRFA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • filetransfer.io/data-package/gim4JWFQ/download
                                            ORDER_LIST_OCTQTRFA00541.exeGet hashmaliciousAgentTeslaBrowse
                                            • filetransfer.io/data-package/nRJn2xsI/download
                                            QUOTATION_OCTQTRFA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • filetransfer.io/data-package/TvlWlABo/download
                                            Payment_Slip_(SWIFT)#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • filetransfer.io/data-package/vZQN1oGp/download
                                            178.237.33.50comprobante.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            segura.vbsGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            Cargo Invoice_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • geoplugin.net/json.gp
                                            Synliggre.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • geoplugin.net/json.gp
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            mCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                            • geoplugin.net/json.gp
                                            CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • geoplugin.net/json.gp
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            filetransfer.ioQUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            rBankRemittance_pdf.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            rPO3799039985.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            s24.filetransfer.ioQUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousFormBookBrowse
                                            • 188.114.96.3
                                            QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            geoplugin.netcomprobante.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            segura.vbsGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Cargo Invoice_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            Synliggre.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            RFQ Nr. 201124559-201124569-201175771.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            mCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUShttps://go.jrwcap.com/e/955053/230645595232154/6xyvj/710994189/h/-dwcgo8Jrn520ILsDDgocWZSKLzmmTijUb6c_giV2KAGet hashmaliciousPhisherBrowse
                                            • 104.22.72.81
                                            dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 172.67.177.134
                                            AWB NO - 09804480383.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                            • 104.21.67.152
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 104.21.88.250
                                            Vendor Agreement Ready for Your Signature November 22 2024 at 084923 PM.msgGet hashmaliciousHTMLPhisherBrowse
                                            • 172.67.206.110
                                            file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                            • 104.21.88.250
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 172.67.155.47
                                            ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            • 172.67.145.234
                                            http://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                            • 104.18.11.207
                                            https://protect-us.mimecast.com/s/N4SFCv2zvkHW7wOAuzlFYeGet hashmaliciousUnknownBrowse
                                            • 104.19.230.21
                                            AS-COLOCROSSINGUSShipping Document.xlsGet hashmaliciousHTMLPhisherBrowse
                                            • 107.172.44.175
                                            solicitud de cotizaci#U00f3n..09.xlam.xlsxGet hashmaliciousUnknownBrowse
                                            • 104.168.7.19
                                            x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 23.95.140.216
                                            sora.x86.elfGet hashmaliciousMiraiBrowse
                                            • 104.170.219.167
                                            arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 192.3.253.172
                                            kXPgmYpAPg.docGet hashmaliciousUnknownBrowse
                                            • 192.3.101.150
                                            kXPgmYpAPg.docGet hashmaliciousUnknownBrowse
                                            • 192.3.101.150
                                            Payment Advice.xlsGet hashmaliciousHTMLPhisher, LokibotBrowse
                                            • 192.3.243.136
                                            seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                            • 192.3.101.149
                                            generatethebstgoodpeoplesaroundtheworldwithgood.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                            • 107.173.4.61
                                            ATOM86-ASATOM86NLcomprobante.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            segura.vbsGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Cargo Invoice_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            Synliggre.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            eBHn6qHPLz.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            mCtN05kxh6.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Bank Fund Transfer-589237.scr.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            Payment Transfer Request Form.bat.exeGet hashmaliciousRemcosBrowse
                                            • 178.237.33.50
                                            CargoInvoice_Outstanding_56789_2024-11-21.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 178.237.33.50
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e19wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                            • 172.67.200.96
                                            WNIOSEK BUD#U017bETOWY 25-11-2024#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            file.exeGet hashmaliciousStealc, VidarBrowse
                                            • 172.67.200.96
                                            file.exeGet hashmaliciousStealc, VidarBrowse
                                            • 172.67.200.96
                                            412300061474#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            order requirements CIF-TRC809910645210.exeGet hashmaliciousMassLogger RATBrowse
                                            • 172.67.200.96
                                            Cargo Invoice_pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            KAHILINGAN NG BADYET 25-11-2024#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            URGENT!! DHL invoice SG00101637 Adobe#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 172.67.200.96
                                            rorderrequirementsCIF-TRC809910645210.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 172.67.200.96
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dllrBankRemittance_pdf.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              H6s8pGsYjg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                4mS4e05nQp.exeGet hashmaliciousGuLoaderBrowse
                                                  4mS4e05nQp.exeGet hashmaliciousGuLoaderBrowse
                                                    H6s8pGsYjg.exeGet hashmaliciousGuLoaderBrowse
                                                      SecuriteInfo.com.FileRepMalware.835.16222.exeGet hashmaliciousUnknownBrowse
                                                        SecuriteInfo.com.FileRepMalware.835.16222.exeGet hashmaliciousUnknownBrowse
                                                          BM-FM_NR.24040718PDF.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                            BM-FM_NR.24040718PDF.exeGet hashmaliciousGuLoaderBrowse
                                                              4000382404CAPMO -PI SIMONE xlsx.exeGet hashmaliciousGuLoaderBrowse
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):144
                                                                Entropy (8bit):3.365630494294252
                                                                Encrypted:false
                                                                SSDEEP:3:rhlKlf4y86i5JWRal2Jl+7R0DAlBG45klovDl6v:6lfd8x5YcIeeDAlOWAv
                                                                MD5:7E009772293F5B2FE2D7487020C8EF82
                                                                SHA1:409B14393B4959176DC46B98C263301E519B8166
                                                                SHA-256:1C740EBF498D6831D3C1DA23B5383E960DB50BFC14DA52E410902B059D0FB850
                                                                SHA-512:A8C65C07346F6081B2D17E0BD0EB7B53946E0C6DFDA8E5841380E7E3B78596739A35FBCF8BDEE819F1B8F3021854317F919A049B6FE4C0232AD65024080B64C3
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                Reputation:low
                                                                Preview:....[.2.0.2.4./.1.1./.2.5. .0.7.:.4.1.:.1.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:JSON data
                                                                Category:dropped
                                                                Size (bytes):962
                                                                Entropy (8bit):5.015105568788186
                                                                Encrypted:false
                                                                SSDEEP:12:tkluQ+nd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qluQydRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                MD5:8937B63DC0B37E949F38E7874886D999
                                                                SHA1:62FD17BF5A029DDD3A5CFB4F5FC9FE83A346FFFC
                                                                SHA-256:AB2F31E4512913B1E7F7ACAB4B72D6E741C960D0A482F09EA6F9D96FED842A66
                                                                SHA-512:077176C51DC10F155EE08326270C1FE3E6CF36C7ABA75611BDB3CCDA2526D6F0360DBC2FBF4A9963051F0F01658017389FD898980ACF7BB3B29B287F188EE7B9
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:{. "geoplugin_request":"8.46.123.75",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):11264
                                                                Entropy (8bit):5.771243767149499
                                                                Encrypted:false
                                                                SSDEEP:192:MPtkumJX7zB22kGwfy0mtVgkCPOs91un:9702k5qpds9Qn
                                                                MD5:375E8A08471DC6F85F3828488B1147B3
                                                                SHA1:1941484AC710FC301A7D31D6F1345E32A21546AF
                                                                SHA-256:4C86B238E64ECFAABE322A70FD78DB229A663CCC209920F3385596A6E3205F78
                                                                SHA-512:5BA29DB13723DDF27B265A4548606274B850D076AE1F050C64044F8CCD020585AD766C85C3E20003A22F356875F76FB3679C89547B0962580D8E5A42B082B9A8
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: rBankRemittance_pdf.scr.exe, Detection: malicious, Browse
                                                                • Filename: H6s8pGsYjg.exe, Detection: malicious, Browse
                                                                • Filename: 4mS4e05nQp.exe, Detection: malicious, Browse
                                                                • Filename: 4mS4e05nQp.exe, Detection: malicious, Browse
                                                                • Filename: H6s8pGsYjg.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.FileRepMalware.835.16222.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.FileRepMalware.835.16222.exe, Detection: malicious, Browse
                                                                • Filename: BM-FM_NR.24040718PDF.exe, Detection: malicious, Browse
                                                                • Filename: BM-FM_NR.24040718PDF.exe, Detection: malicious, Browse
                                                                • Filename: 4000382404CAPMO -PI SIMONE xlsx.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....{.W...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):312412
                                                                Entropy (8bit):1.2500659479081568
                                                                Encrypted:false
                                                                SSDEEP:768:QX7lOX/3JCSDtHImPOGjCMN1Qwy+yw5qphE5wMQppPxLh9/cP+Elx/dybUFv6pEq:Jj6gV4hrCAp2YbhsMgeZHkiBE3+5
                                                                MD5:E2BFE58E79651BB45DA1E99AF3E9FA25
                                                                SHA1:36CF563D284AE65C5EC37A1770B4E51947C8207A
                                                                SHA-256:3A33A0F9AAD93E4055D40CEA6312D3B3D1EB129F1A3C8C321467DA89F014FDC8
                                                                SHA-512:2408F3405F2886A757124C00F352B2292041F1295A00A0DEA7C905C17BC84B172F7DCA463C3A6A401DB3BC77843C22BAE0C823B9D0B884C4D1DAB21D8C891676
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:....................;....................6..................?....................f.............&.........................P.......o............................................=.......................}..Q............a......j.........................................*.........................................I.................................................................................(...........................6........................................................................................................*.................x..........................................g......................}...................u.................................y......................Y........R........................~..............................................e..........................................1..*^.........................................,................................%............................x.....(...............f................f.............&................................q
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):143372
                                                                Entropy (8bit):4.603558127145193
                                                                Encrypted:false
                                                                SSDEEP:3072:r0Q1U1T2LPEY4S4aSbueC0oa8h4YlQbHKlJCyS:oOVwY4BaB3lprCyS
                                                                MD5:E7C6C6D40045245ED7379563D608EE4E
                                                                SHA1:809729D794E55CEE01F6F4EC27A762B36D4962C8
                                                                SHA-256:BCF3A73B7D79A360924894A7D2FEB20BEB22A05C83FA7CE0C97FCC46A91E763C
                                                                SHA-512:474ADCC2C65D4AF4C462D5631CBF9594B48D3D858C250869182A349D0926A79A4208B835CADA5F01524103383A35785C25551C67A126BFF1DE697D91871E2877
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:............%..$.....44................q...@................222...............~............................Z.O.......m.`....+++.......}}}}}}}..........Q.....g....................)................................#.....{{..]]]]............yyy...........$..''..8888................................ ...^...|......__..........V.......{....YY....I.....jjj..........!.LL......v.C......................oo.....b......e..uuu...s.)..'''........!.ppp.........0..........?...2........................}}}}}...&........[......EE.....99.....\.......LL.{..................................................................kk.....MMMMMMM.................xxxxxx.....s...33....OOOOO.kk.......@@...........................\\\\\................W.!..PPP...3..........3333333333.....................................................---................99.......b..qqqq..................................X.........NNNNNNN.w.......a.0......55.===..L.Q...444..............m..t.#....}}.DD................YYYY.............rrrr..UU....
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):454047
                                                                Entropy (8bit):1.2505435420421065
                                                                Encrypted:false
                                                                SSDEEP:768:e76cXoLGuJRckoY8lCCcGyHqZB1+R8RYoKeXemBfRamFdP0D3DQqR+q67OvYbaT9:NkJkmEkn8IotDAwqXgp410PeIA7Y
                                                                MD5:75EF339273C7DDEC322205D23C62CFFD
                                                                SHA1:21DA7EDE40DC198A5C3533950318703CA25A1EC7
                                                                SHA-256:3A0BE07E38397FC93AE0E699C76418EF4C63DAA6B05689B8E6D6E62A724AC052
                                                                SHA-512:351B4E16C5A35C08FD2BAE00B6BADBCEAF91A6FE14529AD574DC350021860BAF81DED6230448E9F3E89B568071F6DDB67FCC9060F1D5557494D710DD08698897
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:.....Wq............i..........................a]....F..w..................................{........................................u.........................J............................9w..........!........................................C.............................................9................R..........................N.............j......................................6......6.....................................................................................w....,...........................................................................................z.............n......................................J..z................. ..................................q............V............:..$.....................................%....^...D.+.................T........h...................................................r........................$.....(....v........W.............................................A.................................F.............m.Q.......G............
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):380892
                                                                Entropy (8bit):7.633867639410607
                                                                Encrypted:false
                                                                SSDEEP:6144:16+2OrAKYssWvCmRopppeJ7CkM3jg156OTouSUdraAKKzWB/YInjJnkLFo4vuQQI:Qtr6zvChppw7SkL6gouJEWqB/rjJnCxN
                                                                MD5:035BEDAD0927187D77836715E03BC8C0
                                                                SHA1:CF8D1F87BCBF69455AA14E719A0E1004AD0D02B9
                                                                SHA-256:0FD22D73EC632F2DA1991A229A92668A3D6D8C7F7D888B04BF86771F84F90F4D
                                                                SHA-512:D8B3BFCFBA47CBDCBFAC114BCF359BF62537C6D1AF6736E3396243CCFC62EF08BA268BFD45858065220DD5732C517439E18B6ECEB866761794C75C377F6D24B4
                                                                Malicious:false
                                                                Preview:..WW.....OO................jjjj......E..4444......WWWW.....J.........||............___.....Q.........p..............R.............#.............*.FF.*.T...^.....F.^.R........................................`....;.................................b...........o............l.Qn[...V]...4.!@......f.s.8.4/...*..w....".t..L7.d4.K~)(.+.......g,..\M.).....>......8.........<hkc{2.3...SfsJ...DP.AX..6y:.|..o.i$8.9pR.....v[.f...f..../...F....^E.....%....?`..YU....a=.......G ....c..&..5.!.1............C....;..'0..NvB....f......i..A...&.....#.J?....-....H..r........l.Qn[...V]...4.!@../...*...9T......<.w....".t..L7.d4.K~)(.+.......g,..\M.).....>..........<hk..f.a..s.t.+{2.3...SfsJ...DP.AX..6y:.|..o.i$8.9pR...z........?..F....^E.....%....?`..YU....a=.......GG..5.!.1..............]........C....;..'0..NvB.......&..... ...f.i..8#.J?....-....H..r........l.Qn[...V]...4.!@../...*....q....Cw....".t..L7.d4.K~)(.+.......g,..\M.).....>..........<hkc{2.3.....U.[.....(
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):329616
                                                                Entropy (8bit):1.2556941931450516
                                                                Encrypted:false
                                                                SSDEEP:768:ghIGzhQz76G44OyLkPR6WAzlGcoZHCki+Hz1/10GJaZDKJsFv1WMSE6PeW7w1CwL:DWf95Lu+kC/wkTdX7UfyfNGwHNqOv1+/
                                                                MD5:A97FE872A9DEB61152EA1C3CC5430602
                                                                SHA1:C941CD396CE59666C46DA339F1E1A021224A3621
                                                                SHA-256:8ECDBBE068CDC639A96DCC307C4D9FCF7EAC911B009E726693F69BCE3C95B35C
                                                                SHA-512:ECE02E3E1C214AC01DC55AAA6406DD4815FD54159EBFDF60435D0A6A0D4FED0D359F79D980040FCCE408F54719C5DF2EA4BD8D83F19C1A21A878ADCC56A102E2
                                                                Malicious:false
                                                                Preview:...................~.............1......m............................_..F.....................*...........~........................................3..................#........................................................e.......................................................%....................9.|.........Q..........................................................................................f...........k.Ed... ..N..........%.....................................................................N............................r.......................................E................|.................................................N..........................................}.......................................................P..............n.......1.._.....=...................[.................y.0........B..................../..............>......x.........................................................0.....................................................Y......................
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):401382
                                                                Entropy (8bit):1.2557772811513337
                                                                Encrypted:false
                                                                SSDEEP:1536:vbmqXCcTXKZfOtOO3ZQkkUB7PUq8nudcHcxeFxi7CL:vyX86ZGRBnj8nOy
                                                                MD5:F21E9CC8C12DB8B0A5E6F1372407EDF6
                                                                SHA1:23533ACADDDA630630C2D8169F2BAAF81CB13F9E
                                                                SHA-256:F959C2FEC98B52B5C4D014B237D1092141C8F4CDB333B012C3694EAB856A6AC3
                                                                SHA-512:E3495BC2A6534ECA8D9936D66A58348000E3877331742D09E619F2FEFBA42D84397F4351BBD5364493FFD4F3E9D67A0BF6D7E7B7D0BF593926A9AA59ED49866F
                                                                Malicious:false
                                                                Preview:..........o...................&...5.....7..........................h.........O............!...................................:...........)............................................C................&.......D...................{................................................................................l................h.....................!.....................E....................F..............................u...................................................................................P..j......................u............................................................#....................w...............y....................................................................................z..W..........................................................X........ZA......,.................y.................................................Y....................................^...........*....S...............'...............n.............................n.....%..........p...
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):429858
                                                                Entropy (8bit):1.2467208624993744
                                                                Encrypted:false
                                                                SSDEEP:1536:Y/M4mr7UiKCZ5Xr3THeV6ae9Da6LH3cucuA:Y/M4q0w5XLG6CysuY
                                                                MD5:683F7A8CA1E6F857F84463A9F9F7F2B9
                                                                SHA1:DD477140CFF795A1EEA082D93E721D5913102F52
                                                                SHA-256:AD31FD468B90B03A64EBDA64A4EAEFD3D207DF0F699CC8FEFAFDAF4BF022DF7E
                                                                SHA-512:A69E97F0D85F29EA7BCB3C425D8E6F8D33040B5E3CEC02608DD8579B41D4CEE9B0107B0FB2BE5A16BDC5EC8F59369F65EB8D4638D8C518F523EFB878A544042D
                                                                Malicious:false
                                                                Preview:.................................h........r..e........O......e..................>...............$..........n...........................X...........................l........+........{....Q....................................................................4..............^......................................0.....u......................................................_.......u..............?....................................................I......................G.....0...........>..............................................@.........................r...................O...............u...........................j....................................................................................................................S.P..............Y........8...................V.......................@................................................g............................................F......................................................s.......................................
                                                                Process:C:\Users\user\Desktop\PO_203-25.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):451
                                                                Entropy (8bit):4.173047622517136
                                                                Encrypted:false
                                                                SSDEEP:12:qdyPa4vhNQvKkTyIhA6xEicAcMDtIgSXWQZSikY:qShNQvF6/ApZSmG
                                                                MD5:4A9C590318347BEBA8FE8A97EBCC0EFD
                                                                SHA1:12EA7DAC204791DC389D37B7B1A2D8109C1B88DF
                                                                SHA-256:4B8916CF18402F51ECDB56923F5AA1AA226EBA01A583914577EDDBCC1F285771
                                                                SHA-512:95F50B907F9FD02087D965264E8DDAD642EAA62BFE3E71A8347C702CF3FDD838ADADEE0D1132F2E5E9913B34670D457A166C410F1E98D53C3929F4B8E715423B
                                                                Malicious:false
                                                                Preview:beckoner humation decorement satinwoods familierne nbg.palatium idrosis greenware earnestnesses senatoren alarmur counteractions fermenter plenarmders aver trgrnserne glutenets..asimov noctilucence begynderkurser springmeldings sandpipers elvers variags.etherealised park albinuria slutresultat snakeling vltepeterne generationskampen ruesome sulphopupuric sawneys..reendowed skglaven joggler,allalinite reigning planeringens promulgators pocherendes.
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                Entropy (8bit):7.054288818733064
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:PO_203-25.exe
                                                                File size:1'135'960 bytes
                                                                MD5:bcf1b4c359d89892cbdeddcac52fd4d7
                                                                SHA1:3c12d1efe6438fed0bcec88c23c5994c44066e43
                                                                SHA256:915903938dd1c51abd0f1e2f35e0fca67040694d9f5b1edd5825533a70a7269f
                                                                SHA512:8d7537428ac645f0e9211f0d2efb96b038901d9937c25426c6d518300a405389ec85e8ebe612c980fa1f8af53d618c29ef1b415bf645959b858acbc92cde48e9
                                                                SSDEEP:12288:DYT2LK1jMVzATVewPQGKYkDWpktoYH3gUOQe7Vt8js7o8ucQPiEC6A:DYT2QMVzATgGKYkLoYXgLTE8ucQPi/6A
                                                                TLSH:DA359C61BF78FDDBD48944F1D0268A2DC7165FF26419013EA3C23E59BEB636158B0CA2
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@............/...........s.../...............+.......Rich............................PE..L....{.W.................^....9....
                                                                Icon Hash:302338b989879209
                                                                Entrypoint:0x4030ec
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x57807BB9 [Sat Jul 9 04:21:13 2016 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:b78ecf47c0a3e24a6f4af114e2d1f5de
                                                                Signature Valid:false
                                                                Signature Issuer:CN=Fastlagt, O=Fastlagt, L=Thouars, C=FR
                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                Error Number:-2146762487
                                                                Not Before, Not After
                                                                • 10/08/2024 09:22:15 10/08/2027 09:22:15
                                                                Subject Chain
                                                                • CN=Fastlagt, O=Fastlagt, L=Thouars, C=FR
                                                                Version:3
                                                                Thumbprint MD5:A855F3301D96B73BCFEA9871335C499D
                                                                Thumbprint SHA-1:CDA2835BBC18D9452015B4664FAB2E1DDC49099A
                                                                Thumbprint SHA-256:982C6D1CA15396C88F0617B99F34AD4695FC6F86CD7361B50146A523ECC13834
                                                                Serial:0B147D78B05181202C759689B6FFCF91AD76260B
                                                                Instruction
                                                                sub esp, 00000184h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                xor ebx, ebx
                                                                push 00008001h
                                                                mov dword ptr [esp+18h], ebx
                                                                mov dword ptr [esp+10h], 00409198h
                                                                mov dword ptr [esp+20h], ebx
                                                                mov byte ptr [esp+14h], 00000020h
                                                                call dword ptr [004070A8h]
                                                                call dword ptr [004070A4h]
                                                                cmp ax, 00000006h
                                                                je 00007FC7F0E97403h
                                                                push ebx
                                                                call 00007FC7F0E9A371h
                                                                cmp eax, ebx
                                                                je 00007FC7F0E973F9h
                                                                push 00000C00h
                                                                call eax
                                                                mov esi, 00407298h
                                                                push esi
                                                                call 00007FC7F0E9A2EDh
                                                                push esi
                                                                call dword ptr [004070A0h]
                                                                lea esi, dword ptr [esi+eax+01h]
                                                                cmp byte ptr [esi], bl
                                                                jne 00007FC7F0E973DDh
                                                                push ebp
                                                                push 00000009h
                                                                call 00007FC7F0E9A344h
                                                                push 00000007h
                                                                call 00007FC7F0E9A33Dh
                                                                mov dword ptr [007A1F44h], eax
                                                                call dword ptr [00407044h]
                                                                push ebx
                                                                call dword ptr [00407288h]
                                                                mov dword ptr [007A1FF8h], eax
                                                                push ebx
                                                                lea eax, dword ptr [esp+38h]
                                                                push 00000160h
                                                                push eax
                                                                push ebx
                                                                push 0079D500h
                                                                call dword ptr [00407174h]
                                                                push 00409188h
                                                                push 007A1740h
                                                                call 00007FC7F0E99F67h
                                                                call dword ptr [0040709Ch]
                                                                mov ebp, 007A8000h
                                                                push eax
                                                                push ebp
                                                                call 00007FC7F0E99F55h
                                                                push ebx
                                                                call dword ptr [00407154h]
                                                                Programming Language:
                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3bc0000x56f00.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x1143780x11e0.data
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x5db60x5e00f367801e476b699be2b532039e0b583cFalse0.6806848404255319data6.508470969322742IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x70000x12460x140043fab6a80651bd97af8f34ecf44cd8acFalse0.42734375data5.005029341587408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x90000x3990380x40029ebcbec0bd7bd0fecb3d2937195c560unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .ndata0x3a30000x190000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x3bc0000x56f000x57000abc24a3b3437be2709f45b1cd210d1a8False0.15879242995689655data3.3786801766145547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x3bc2c80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.1301483859514158
                                                                RT_ICON0x3fe2f00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.21354844433928782
                                                                RT_ICON0x40eb180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.3350622406639004
                                                                RT_ICON0x4110c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3946998123827392
                                                                RT_ICON0x4121680x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.49113475177304966
                                                                RT_DIALOG0x4125d00x100dataEnglishUnited States0.5234375
                                                                RT_DIALOG0x4126d00x11cdataEnglishUnited States0.6056338028169014
                                                                RT_DIALOG0x4127f00xc4dataEnglishUnited States0.5918367346938775
                                                                RT_DIALOG0x4128b80x60dataEnglishUnited States0.7291666666666666
                                                                RT_GROUP_ICON0x4129180x4cdataEnglishUnited States0.7894736842105263
                                                                RT_VERSION0x4129680x258dataEnglishUnited States0.5116666666666667
                                                                RT_MANIFEST0x412bc00x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                                                                DLLImport
                                                                KERNEL32.dllSetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                                                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                                ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-25T13:40:57.582700+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.349714172.67.200.96443TCP
                                                                2024-11-25T13:41:17.748952+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.349716192.3.176.1347062TCP
                                                                2024-11-25T13:41:20.399125+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.349717178.237.33.5080TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 25, 2024 13:40:55.307952881 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:55.307993889 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:55.308063984 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:55.325392962 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:55.325414896 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:56.639945984 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:56.640074015 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:56.804394960 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:56.804414988 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:56.804977894 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:56.805035114 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:56.809643984 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:56.851337910 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.582662106 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.582763910 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.582778931 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.582825899 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.582884073 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.587634087 CET49714443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.587651968 CET44349714172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.744329929 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.744362116 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:57.744524956 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.745245934 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:57.745258093 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:59.050179958 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:59.050297022 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:59.053848982 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:59.053855896 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:59.054207087 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:40:59.054286957 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:59.054569960 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:40:59.095335007 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688070059 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688119888 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688153982 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688184977 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688189983 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.688208103 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688220978 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.688241959 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688271999 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.688281059 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.688296080 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.688330889 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.696248055 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.696332932 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.697942019 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.697999954 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.706337929 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.706408024 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.706511974 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.706562996 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958417892 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958472967 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958497047 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958501101 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958529949 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958545923 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958563089 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958570957 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958570957 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958581924 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958600998 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958612919 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958625078 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958631992 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958653927 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958684921 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958689928 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958697081 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958723068 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958733082 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958750963 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958755016 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958760977 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958791018 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958805084 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958817005 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958822012 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958848000 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958864927 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958873034 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.958884954 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.958915949 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:11.988559961 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:11.988641977 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.002847910 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.002913952 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.005352974 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.005423069 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.005429983 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.005477905 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.015860081 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.015938997 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.079454899 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.079518080 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.079547882 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.079590082 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.107268095 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.107355118 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.107373953 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.107426882 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.110980034 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.111058950 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.111073971 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.111155033 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.118936062 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.119008064 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.119024038 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.119081020 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.133805037 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.133873940 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.148953915 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.149034023 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.156454086 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.156521082 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.171555042 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.171622992 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.186724901 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.186810970 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.201807022 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.201877117 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.209500074 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.209579945 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.223983049 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.224050045 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.237396955 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.237466097 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.251024961 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.251091957 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:12.258079052 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:12.258137941 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.728880882 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.729053020 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.729928970 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.730000019 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.733642101 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.733705044 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.736394882 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.736448050 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.814894915 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.814960003 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.818109035 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.818171024 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.821974993 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.822040081 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.826898098 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.826962948 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.829579115 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.829641104 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.834758997 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.834822893 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.839797974 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.839862108 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.842386007 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.842444897 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.902218103 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.902462959 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.907144070 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.907213926 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.912343025 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.912405968 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.914443016 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.914506912 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.919209957 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.919272900 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.924549103 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.924614906 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.930327892 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.930393934 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.931701899 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.931760073 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.938338995 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.938405037 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.940710068 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.940772057 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.944752932 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.944814920 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.950871944 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.950933933 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.995168924 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.995286942 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:13.999351978 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:13.999447107 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.004355907 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.004415989 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.009505033 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.009602070 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.012126923 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.012192965 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.027802944 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.027816057 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.027853966 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.027956963 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.027981997 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.028053999 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.045649052 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.045671940 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.045794010 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.045804024 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.045924902 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.063169003 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.063191891 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.063252926 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.063266039 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.063349962 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.110178947 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.110203981 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.110253096 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.110270023 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.110285044 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.110308886 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.118591070 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.118611097 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.118670940 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.118679047 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.118721962 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.129146099 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.129165888 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.129287004 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.129293919 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.129370928 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.204050064 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.204075098 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.204174042 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.204184055 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.204231024 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.210848093 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.210869074 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.210978985 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.210987091 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.211036921 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.234926939 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.234951019 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.235022068 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.235038042 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.235070944 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.235080004 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.243695974 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.243724108 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.243767977 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.243776083 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.243804932 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.243813038 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.250432014 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.250452042 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.250544071 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.250550985 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.250598907 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.320820093 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.320846081 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.321027994 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.321048975 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.321098089 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.326878071 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.326900005 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.326968908 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.326976061 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.327023983 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.332932949 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.332952976 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.333125114 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.333133936 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.333183050 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.414597988 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.414627075 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.414714098 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.414742947 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.414783001 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.420176029 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.420197964 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.420273066 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.420280933 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.420321941 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.444732904 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.444756985 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.444883108 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.444899082 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.444947958 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445657969 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.445722103 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445729971 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.445741892 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.445777893 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445806026 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445825100 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445846081 CET44349715172.67.200.96192.168.2.3
                                                                Nov 25, 2024 13:41:14.445858002 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:14.445899010 CET49715443192.168.2.3172.67.200.96
                                                                Nov 25, 2024 13:41:16.364991903 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:16.485126972 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:16.485238075 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:16.488739967 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:16.608642101 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:17.703305960 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:17.748951912 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:17.955852032 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:17.959943056 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:18.082653999 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:18.082783937 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:18.203536034 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:18.435528040 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:18.445836067 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:18.565809965 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:18.645670891 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:18.688925982 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:19.036031961 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:41:19.156070948 CET8049717178.237.33.50192.168.2.3
                                                                Nov 25, 2024 13:41:19.156143904 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:41:19.156443119 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:41:19.276364088 CET8049717178.237.33.50192.168.2.3
                                                                Nov 25, 2024 13:41:20.399060011 CET8049717178.237.33.50192.168.2.3
                                                                Nov 25, 2024 13:41:20.399125099 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:41:20.406326056 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:20.526566029 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:21.398705006 CET8049717178.237.33.50192.168.2.3
                                                                Nov 25, 2024 13:41:21.398799896 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:41:43.991451979 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:41:43.992767096 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:41:44.112869978 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:42:13.834279060 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:42:13.837121010 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:42:13.957578897 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:42:43.853943110 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:42:43.855282068 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:42:43.975583076 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:42:45.140333891 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:42:45.499093056 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:42:46.186561108 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:42:47.592854977 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:42:50.092866898 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:42:55.186578989 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:43:05.186655998 CET4971780192.168.2.3178.237.33.50
                                                                Nov 25, 2024 13:43:13.884793997 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:43:13.886358976 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:43:14.007394075 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:43:43.932385921 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:43:43.934004068 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:43:44.054022074 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:44:13.931302071 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:44:13.932791948 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:44:14.296056032 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:44:14.533921003 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:44:14.534039974 CET706249716192.3.176.134192.168.2.3
                                                                Nov 25, 2024 13:44:14.534081936 CET497167062192.168.2.3192.3.176.134
                                                                Nov 25, 2024 13:44:14.534146070 CET706249716192.3.176.134192.168.2.3
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 25, 2024 13:40:55.156371117 CET5155853192.168.2.31.1.1.1
                                                                Nov 25, 2024 13:40:55.294013023 CET53515581.1.1.1192.168.2.3
                                                                Nov 25, 2024 13:40:57.600332022 CET5586853192.168.2.31.1.1.1
                                                                Nov 25, 2024 13:40:57.742448092 CET53558681.1.1.1192.168.2.3
                                                                Nov 25, 2024 13:41:18.803141117 CET4948753192.168.2.31.1.1.1
                                                                Nov 25, 2024 13:41:19.035244942 CET53494871.1.1.1192.168.2.3
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 25, 2024 13:40:55.156371117 CET192.168.2.31.1.1.10x52e0Standard query (0)filetransfer.ioA (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:40:57.600332022 CET192.168.2.31.1.1.10xf0a3Standard query (0)s24.filetransfer.ioA (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:41:18.803141117 CET192.168.2.31.1.1.10xf986Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 25, 2024 13:40:55.294013023 CET1.1.1.1192.168.2.30x52e0No error (0)filetransfer.io172.67.200.96A (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:40:55.294013023 CET1.1.1.1192.168.2.30x52e0No error (0)filetransfer.io104.21.13.139A (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:40:57.742448092 CET1.1.1.1192.168.2.30xf0a3No error (0)s24.filetransfer.io172.67.200.96A (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:40:57.742448092 CET1.1.1.1192.168.2.30xf0a3No error (0)s24.filetransfer.io104.21.13.139A (IP address)IN (0x0001)false
                                                                Nov 25, 2024 13:41:19.035244942 CET1.1.1.1192.168.2.30xf986No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                • filetransfer.io
                                                                • s24.filetransfer.io
                                                                • geoplugin.net
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.349717178.237.33.50807892C:\Users\user\Desktop\PO_203-25.exe
                                                                TimestampBytes transferredDirectionData
                                                                Nov 25, 2024 13:41:19.156443119 CET71OUTGET /json.gp HTTP/1.1
                                                                Host: geoplugin.net
                                                                Cache-Control: no-cache
                                                                Nov 25, 2024 13:41:20.399060011 CET1170INHTTP/1.1 200 OK
                                                                date: Mon, 25 Nov 2024 12:41:20 GMT
                                                                server: Apache
                                                                content-length: 962
                                                                content-type: application/json; charset=utf-8
                                                                cache-control: public, max-age=300
                                                                access-control-allow-origin: *
                                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                Data Ascii: { "geoplugin_request":"8.46.123.75", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.349714172.67.200.964437892C:\Users\user\Desktop\PO_203-25.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-25 12:40:56 UTC190OUTGET /data-package/NOvf4VgB/download HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Host: filetransfer.io
                                                                Cache-Control: no-cache
                                                                2024-11-25 12:40:57 UTC1239INHTTP/1.1 302 Found
                                                                Date: Mon, 25 Nov 2024 12:40:57 GMT
                                                                Content-Type: text/html; charset=utf-8
                                                                Transfer-Encoding: chunked
                                                                Connection: close
                                                                X-Powered-By: Nette Framework 3
                                                                X-Frame-Options: SAMEORIGIN
                                                                Set-Cookie: nette-samesite=1; path=/; SameSite=Strict; HttpOnly
                                                                Set-Cookie: PHPSESSID=c9h6d86qa6anr7io6fkbvm0hi9; expires=Mon, 09-Dec-2024 12:40:57 GMT; Max-Age=1209600; path=/; SameSite=Lax; secure; HttpOnly
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Pragma: no-cache
                                                                Vary: X-Requested-With
                                                                Location: https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJ
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7OPIXhx8mS7VXrTqg7HEU%2BmD6euLzGa5fCTU8UPRsCvrizjHKaAu510MKg5M1OoBHUgpTETg1jCw7hSzFAOcXkIZBp8OhCFnsUzQogAg8T4e%2BX2KXaFCxyZfssEoPamMSY8%3D"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e81b5cc1c4943ab-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=2058&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=828&delivery_rate=1385856&cwnd=221&unsent_bytes=0&cid=4e10255ea71de8d4&ts=957&x=0"
                                                                2024-11-25 12:40:57 UTC130INData Raw: 38 30 0d 0a 3c 68 31 3e 52 65 64 69 72 65 63 74 3c 2f 68 31 3e 0a 0a 3c 70 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 32 34 2e 66 69 6c 65 74 72 61 6e 73 66 65 72 2e 69 6f 2f 73 74 6f 72 61 67 65 2f 64 6f 77 6e 6c 6f 61 64 2f 58 50 6a 6e 44 6b 4c 52 70 64 66 4a 22 3e 50 6c 65 61 73 65 20 63 6c 69 63 6b 20 68 65 72 65 20 74 6f 20 63 6f 6e 74 69 6e 75 65 3c 2f 61 3e 2e 3c 2f
                                                                Data Ascii: 80<h1>Redirect</h1><p><a href="https://s24.filetransfer.io/storage/download/XPjnDkLRpdfJ">Please click here to continue</a>.</
                                                                2024-11-25 12:40:57 UTC4INData Raw: 70 3e 0d 0a
                                                                Data Ascii: p>
                                                                2024-11-25 12:40:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                Data Ascii: 0


                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                1192.168.2.349715172.67.200.964437892C:\Users\user\Desktop\PO_203-25.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-25 12:40:59 UTC281OUTGET /storage/download/XPjnDkLRpdfJ HTTP/1.1
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                Cache-Control: no-cache
                                                                Host: s24.filetransfer.io
                                                                Connection: Keep-Alive
                                                                Cookie: nette-samesite=1; PHPSESSID=c9h6d86qa6anr7io6fkbvm0hi9
                                                                2024-11-25 12:41:11 UTC1248INHTTP/1.1 200 OK
                                                                Date: Mon, 25 Nov 2024 12:41:11 GMT
                                                                Content-Type: application/octet-stream
                                                                Content-Length: 493120
                                                                Connection: close
                                                                Last-Modified: Tue, 19 Nov 2024 01:14:37 GMT
                                                                Set-Cookie: nette-samesite=1; path=/; SameSite=Strict; HttpOnly
                                                                Set-Cookie: PHPSESSID=915888c6b82b9dd77ac61ee9b55a153a; expires=Mon, 09-Dec-2024 12:41:09 GMT; Max-Age=1209600; path=/; SameSite=Lax; secure; HttpOnly
                                                                Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                Cache-Control: no-store, no-cache, must-revalidate
                                                                Content-Disposition: attachment; filename="xIalmTPR157.bin"
                                                                Accept-Ranges: bytes
                                                                Accept-Ranges: bytes
                                                                ETag: "673be67d-78640"
                                                                cf-cache-status: DYNAMIC
                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=djthrmeLpKelApc0z1HnpdW2pIC5C9%2FL4qQHnkKxlM4wxKlfsb%2BAqQfn03jhjRz6gDUJpvhYapA6oP%2F5Y6BtoPH0Ozt6k%2BNQELjg4C9aSVLeNGje7qBWNZVXd6SjIZMHqJypvFZ0"}],"group":"cf-nel","max_age":604800}
                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                Server: cloudflare
                                                                CF-RAY: 8e81b5dada8443b1-EWR
                                                                alt-svc: h3=":443"; ma=86400
                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1614&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2834&recv_bytes=895&delivery_rate=1793611&cwnd=195&unsent_bytes=0&cid=752d0af7fbba6c76&ts=12643&x=0"
                                                                2024-11-25 12:41:11 UTC121INData Raw: 72 84 bc b9 59 ed b8 df d6 ba fc 87 43 0e df f0 b5 07 89 8b d6 6a e3 b1 20 9d 64 58 9a 8a 5a 9e a6 19 ee c9 ed f7 be 99 dd 0e bf 62 35 85 8d 33 f2 7b 81 e4 c9 85 14 64 94 ee b6 b8 c4 b1 ea 87 84 01 aa 3b 3f 27 a6 ae f7 3a fc 81 0a 52 5b 0a a8 de 22 4b a4 d9 95 f9 0c 17 40 c5 36 e8 c9 e7 0c af c3 2e 34 28 52 25 6c 7f 67 46 98 95 44 57 fb 5d 6d 32 77 5a 4d 3e 0c
                                                                Data Ascii: rYCj dXZb53{d;?':R["K@6.4(R%lgFDW]m2wZM>
                                                                2024-11-25 12:41:11 UTC1369INData Raw: a0 71 f5 cb 12 b3 18 9f a5 68 e2 4d c7 c2 9f 7f b3 f7 23 70 bb 63 1a cf 12 60 94 59 02 c4 71 6b 17 cb e4 6a ab 6d 44 77 29 b7 db be 76 fb a2 44 3a bc e0 c3 78 c7 bc 8b 4f ad 43 84 91 8f 6d 0e d3 37 97 5c e9 59 de f0 10 97 a3 d6 cf 4d 2a 85 43 b2 47 b8 14 11 60 12 9c 96 a9 35 57 8e c4 b0 76 ed 43 96 a2 e7 a9 65 46 f7 9f ad 03 6a 8a 86 d3 66 a2 32 cc 3b a3 ba 15 3e fd d3 dc 65 29 a3 07 38 47 ec f7 29 0c ec a6 88 c5 34 84 de 90 41 cb ff 60 94 f3 08 8d e1 a1 64 b1 dd 63 0c 1a c7 13 7c d2 43 ef 13 d6 b9 dd 90 fc a7 19 7e a2 e4 27 b7 72 2f 5d 92 e5 9b 5d 01 da 43 50 8b fd 3d 73 08 5e ea e3 b7 aa 4c d1 3b f8 10 4a 33 30 c9 ee 73 b2 b5 76 84 be 03 d7 46 7a 09 84 fc fa e9 66 1c 36 7f ef ac fe 3b 0f 40 3d 4e 8b ae 83 76 ad 7e f4 b0 f0 d6 c3 ce 43 7f 2a 65 53 d8 1a
                                                                Data Ascii: qhM#pc`YqkjmDw)vD:xOCm7\YM*CG`5WvCeFjf2;>e)8G)4A`dc|C~'r/]]CP=s^L;J30svFzf6;@=Nv~C*eS
                                                                2024-11-25 12:41:11 UTC1369INData Raw: 81 0a e2 a2 31 6e ee e8 84 48 81 35 8c e8 0e f1 3f c4 7d 59 a0 1f fb ce 24 14 99 97 01 e8 fe 73 78 93 fe 62 74 f9 40 59 12 f8 8d bd a9 e4 77 b9 ae f1 c2 cc 81 64 a8 ad ed 9e 3f 44 fd e2 b4 da 02 db cd 2c 61 df 2c 9b 86 2c 51 ce 1e 0b ef d7 7e a2 fd 36 b6 cb 82 77 5f ab 06 b5 1f 59 b0 6e d2 61 48 f4 bf 3d 7a 78 07 8f 5a 8d 4a c6 58 59 c2 17 29 11 72 e0 41 fd d5 75 36 ce b5 37 28 2a 13 20 3c 2a 8c d5 84 69 01 e2 51 a3 d0 ee 21 27 9f 7b 4e d7 cf 37 a9 e6 e4 07 b7 72 22 af bf 72 ac 86 ef 6c 4c 27 da 47 c0 f4 56 64 ed fe 53 05 03 9a ca ec 0b 5d 01 ea b8 31 2a 5b 82 4d b8 3f b5 50 a7 79 b5 cc 3d 50 97 8f 7d 39 3b 65 e4 1f 86 b0 7d fc 69 ca a0 5b 0a 78 39 4f 0e a4 31 a5 df 4f 17 19 06 8f 94 8a a0 0c 47 14 b2 35 28 3a d4 01 3a 67 ae 82 b3 47 57 a2 9e d4 72 34 1d
                                                                Data Ascii: 1nH5?}Y$sxbt@Ywd?D,a,,Q~6w_YnaH=zxZJXY)rAu67(* <*iQ!'{N7r"rlL'GVdS]1*[M?Py=P}9;e}i[x9O1OG5(::gGWr4
                                                                2024-11-25 12:41:11 UTC1369INData Raw: 07 48 ec 3b 2c 59 4c 7f 00 01 10 ca a8 1f f5 c8 93 24 78 f1 46 cc 28 ed 48 75 0a 11 3a 9f 7f a5 83 a2 3d 55 26 19 37 cf 7b 28 06 94 9e 1f 74 68 9f ea 99 29 aa b2 da ea b4 59 76 6a b3 fb 95 5a a1 c5 70 8d 33 3b e0 d8 ff d2 b6 ff 5f 6f bc 34 b8 45 30 8e e5 90 f3 80 16 73 d4 c1 e0 06 88 0f c9 53 a8 2f b4 1e 7c 10 be 7e b1 7f 94 2c 5f ac 72 b7 9a 7d 8a 52 6c 5e 66 ad 31 5f ed f4 07 5b de cc ab 8d fb d2 cb 2d b1 07 93 e5 9e 15 af 57 6d 04 7c 6f 42 c2 b6 31 48 c0 69 4c 9e af 93 bc 65 a6 f9 62 6f 18 95 e4 09 4a f2 00 aa 4c 8c 2a 39 b6 bf aa 76 5f f1 7b 1b 19 b5 74 bc 30 17 59 a1 54 78 62 21 f8 fc 80 74 5b a6 f1 33 ec 89 f6 ef 9e 36 a7 f2 5e f6 c2 64 5b 31 35 77 43 f6 2b 87 1c b6 12 8a ec c0 fc 58 de db a8 6a dc b4 28 97 f7 93 40 f6 9d e2 9e c7 05 5b 47 c1 da 54
                                                                Data Ascii: H;,YL$xF(Hu:=U&7{(th)YvjZp3;_o4E0sS/|~,_r}Rl^f1_[-Wm|oB1HiLeboJL*9v_{t0YTxb!t[36^d[15wC+Xj(@[GT
                                                                2024-11-25 12:41:11 UTC1369INData Raw: 02 71 8c 31 63 c9 fa 43 e4 a6 cd b1 ae 87 51 0d 66 f1 2f 5d 2e 2a 89 ca 79 3e 5c 7a e0 86 79 9d 03 19 99 88 3f 84 f4 06 55 86 2d 0e ce 64 6c 34 6f 24 6d 3d 33 02 b8 fb 21 f5 fd 18 28 99 a0 30 cd 9c 7b e4 17 38 09 a6 cb 1d 89 2a 5f 8c 36 42 6c da b7 f8 2a 02 5a be 06 0c 09 76 ea c2 82 11 ce 58 ba 01 37 73 21 f1 76 13 ce a6 5f bc 0f ab 68 f2 36 80 68 fa 25 49 d8 cc c4 72 10 6f 2b 98 81 a3 29 cd 8f e0 f3 ad 82 1c 4f 88 50 36 cf 5c 0c a9 73 29 f8 d9 f9 f5 30 d2 3a a6 48 23 9e 29 2c 39 e6 19 fe 13 24 88 65 16 85 04 2a 51 16 9a eb 69 70 da 4b b8 e7 40 e5 39 f8 a0 1d 28 6a 7b 49 1d 20 ec ba d5 c7 9f 01 31 8e a7 a6 dc fd 28 37 14 16 1d e8 12 41 6d 55 84 17 90 eb 32 51 3f 16 0b 06 72 86 2a 7e 85 14 60 7d 43 46 55 8c ec 1c d6 44 3c 67 c7 7d 5c da ad c6 55 48 06 53
                                                                Data Ascii: q1cCQf/].*y>\zy?U-dl4o$m=3!(0{8*_6Bl*ZvX7s!v_h6h%Iro+)OP6\s)0:H#),9$e*QipK@9(j{I 1(7AmU2Q?r*~`}CFUD<g}\UHS
                                                                2024-11-25 12:41:11 UTC1369INData Raw: 64 0b 51 dd 6e 26 91 ef af d2 a6 3b 88 71 e4 d9 2f e1 73 a3 e9 e7 83 4f 6d 8a ab f3 1e c8 5d 22 60 c7 34 03 ee b8 71 9e a5 6a 9d c2 84 4e 6a d3 2e 9f d6 26 ad f1 d4 19 85 0c 9b 64 3b f5 0e 5d 5f 68 2c 3a 76 bf 28 8f 10 61 76 9d 8d 9e 01 fa 0c 34 04 74 a3 2a d0 e9 5e 6e 0c 1c 57 9c eb 76 84 4c b9 fa 56 eb 12 bb ef 93 cb b0 bc a3 d4 7c 65 b4 c5 35 91 f5 4d f6 7c a9 73 45 0b 4f a2 d9 d8 94 d6 79 ac ed 11 b3 af 17 f8 84 28 3a 3d 31 68 d1 0b 20 1f a6 4e d8 6f e6 d0 a2 8b 10 43 e7 9a 01 07 24 f6 26 1e 1a ca 2d 8a d8 6b 9b 9c 04 a5 4b 1a ef dd a4 46 78 38 2d 48 3e d8 bc 91 0a 7d 49 c3 e2 11 e1 2a 6e 9f 4a 38 a7 b2 87 30 00 15 ee a9 23 25 81 e5 d9 8f c0 b1 e2 31 54 cf f0 60 0b 1e 56 c8 f1 99 08 91 cd 39 ea b2 49 a1 f1 28 be 2f 3e 2e fa 63 18 e4 d3 df 4f de 6f 55
                                                                Data Ascii: dQn&;q/sOm]"`4qjNj.&d;]_h,:v(av4t*^nWvLV|e5M|sEOy(:=1h NoC$&-kKFx8-H>}I*nJ80#%1T`V9I(/>.cOoU
                                                                2024-11-25 12:41:11 UTC1369INData Raw: f3 45 53 a3 ed 7c 23 15 59 14 e2 ce 31 15 1d de 53 7a c1 a6 23 01 bc dc 11 80 8d 60 c0 f8 26 3a 1f b8 98 f3 5c 81 7a 08 6d b5 71 1e 11 04 b9 0e 84 60 c0 e9 1d 27 4e 6e df c5 ff 7d ef e7 1a 77 f5 2c b2 31 d1 ca f5 85 b8 64 d5 a6 bb 34 a7 fa 1c 44 06 97 4c 15 9b a3 aa 6b 84 36 76 74 73 c0 7b 1e 4d 08 97 cb f6 c9 55 d1 9f 53 89 fb db 61 01 72 3a 4d 06 13 22 69 a7 b0 8b a5 ac 22 34 6f ad 7f 23 a3 dc 5d 70 b9 ae 85 3c 38 1a 96 ae 3e 5b e1 99 06 2d 40 a4 57 26 30 f3 94 61 82 52 43 90 05 01 cc e4 77 d5 2f 8f 92 dd ad 9a cc 67 42 fa 0e 34 a6 93 c1 b7 8a 02 ed 61 70 ef e2 1b 7c 37 8c 3a 1f 07 1b 7a 35 de f2 3a ef 18 2c 61 70 4b 72 06 56 68 fa 71 07 80 46 7e ab 87 06 1e 5e f8 14 ef 67 1f b4 cd 91 1c c1 9a 4f f5 fd 8d 24 69 45 90 fb 2d ad 3a 83 aa 44 c7 bb 81 31 87
                                                                Data Ascii: ES|#Y1Sz#`&:\zmq`'Nn}w,1d4DLk6vts{MUSar:M"i"4o#]p<8>[-@W&0aRCw/gB4ap|7:z5:,apKrVhqF~^gO$iE-:D1
                                                                2024-11-25 12:41:11 UTC1369INData Raw: d5 95 7c b3 00 90 9d 1c f2 19 e8 09 15 e6 bf 8f bc a2 c7 3f d0 e2 b5 ae ea 58 db e1 5e b7 88 ab 40 cc b0 9a 63 eb 16 ab 63 76 70 1e e2 5e 6d 37 c2 e1 cf 70 51 6f 87 e2 8b 82 44 ba e8 c4 8a 22 a3 bb a8 d3 ca eb 39 34 a6 6e d1 1f 25 a0 d5 06 7d d0 62 7a e4 6f 08 25 aa a9 cb e6 2f 07 f0 de 0e ee a3 71 69 ea c0 47 80 f7 2a a7 a4 08 69 d0 18 2e 52 60 46 df 41 2e 5a 17 7e f0 10 61 e0 cf ec a3 f8 7d ab 9f 1a b8 68 46 eb 43 19 6f eb 79 13 6e 6f 24 14 21 46 18 c9 f1 b1 a9 8e 9f ac 08 b9 67 50 f6 b0 f0 89 9d af 25 be 2e 65 c8 9c 3e 92 16 b8 0e 28 99 db 05 34 95 b1 29 f2 0f 86 6a 24 cf e3 ba 94 ad bf 0b 0a 49 24 97 43 31 31 87 8e 83 f2 47 32 1c c9 d9 c3 d9 19 06 ba de f4 bc 17 eb e7 9b d6 8a 64 6e c4 a9 b8 e6 b1 11 ff 6c 60 30 7e 7c 0f c6 97 45 05 81 4b d3 d7 aa db
                                                                Data Ascii: |?X^@ccvp^m7pQoD"94n%}bzo%/qiG*i.R`FA.Z~a}hFCoyno$!FgP%.e>(4)j$I$C11G2dnl`0~|EK
                                                                2024-11-25 12:41:11 UTC1369INData Raw: 28 69 e2 34 16 e9 fd 72 47 d8 bf ee 50 68 09 e5 61 9a 31 ff 3f 94 19 86 c5 29 60 a5 1a 74 53 2e 82 79 02 c0 fa a1 b9 82 44 a6 70 61 45 12 b4 ae 5e 37 6c a8 8f 40 91 48 f1 1c 10 26 9b 10 91 62 aa 51 3c b6 16 d5 d8 56 71 a6 06 d6 52 41 25 12 35 88 cf a1 d9 72 5f 52 31 39 6a 56 63 d6 7f f7 62 7d 67 54 b8 a6 81 2a 6e 90 8a f9 c6 85 1d dd 9a 54 07 f7 f9 ec 42 87 af 2c 9c 0c d2 4c df d8 59 25 35 11 3f d1 78 a9 70 09 d6 8e af 4f 9f 89 7d 9a af e8 bf 4e 72 cc f1 64 c8 8b 28 38 62 d7 26 01 48 f7 3b 62 b4 c4 bb 23 df 6d e6 ff 21 b2 72 3b 0c a0 2e ab 9e 48 ea 41 53 b6 d2 b9 c6 9f 9d 05 d5 76 fe 05 bd 65 42 7e f1 89 68 07 d4 92 28 76 16 2c 14 f2 13 92 eb 30 e0 f6 2a 35 db 14 ce 9c 9b 26 de 4d 83 00 c4 74 ec c3 36 d9 29 58 a6 38 74 8e f5 8f 5c 00 34 ad 0f 39 ab 46 7e
                                                                Data Ascii: (i4rGPha1?)`tS.yDpaE^7l@H&bQ<VqRA%5r_R19jVcb}gT*nTB,LY%5?xpO}Nrd(8b&H;b#m!r;.HASveB~h(v,0*5&Mt6)X8t\49F~
                                                                2024-11-25 12:41:11 UTC1369INData Raw: f5 ba f2 c8 d9 4b 7b f3 38 4c 69 1a 85 3b 0b 85 f0 44 bb fc 48 76 a6 f5 3e ba 5d fb 54 7b 90 38 a3 ca c3 41 48 3a 85 f7 a1 c6 70 10 20 3a a9 07 4f 04 d7 27 cd 76 01 bf 09 9d 79 0b 1d 82 67 87 57 56 f3 64 b1 db 3d 1a 3e 2b 4c d6 ec 14 0b 2b 37 1a 03 ed e9 23 3c f3 8b e7 ec 41 f0 45 e5 9b da 60 91 9f a0 48 44 8a 6f 4c 0e ec fb 59 9c 11 d2 6d 7f 01 31 c9 c3 f1 13 ce 02 1e e5 67 cb a9 47 9f 82 c7 45 72 9a a3 10 76 f4 e4 80 f3 c7 32 27 ce 49 ba d7 84 1b 3f 03 9b d9 4d a5 39 89 aa 20 96 1e a3 2c 7f 63 69 46 cc f5 6c 2e 96 53 21 cc af 96 0a a5 1d b5 b1 05 c9 f4 f6 4d 52 d8 00 6a a7 99 41 a9 b3 1a 5c b2 50 f1 2a c4 1e d9 11 06 c5 ff d7 df e0 9f a4 72 8d ba 61 7d cd 54 be f9 dc f4 af 21 45 82 99 8c 13 27 42 b7 39 51 2c 6b f0 96 83 3f f3 3c 00 66 1e 67 f2 51 b2 9f
                                                                Data Ascii: K{8Li;DHv>]T{8AH:p :O'vygWVd=>+L+7#<AE`HDoLYm1gGErv2'I?M9 ,ciFl.S!MRjA\P*ra}T!E'B9Q,k?<fgQ


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:07:40:25
                                                                Start date:25/11/2024
                                                                Path:C:\Users\user\Desktop\PO_203-25.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\PO_203-25.exe"
                                                                Imagebase:0x400000
                                                                File size:1'135'960 bytes
                                                                MD5 hash:BCF1B4C359D89892CBDEDDCAC52FD4D7
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1666518967.0000000005060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:07:40:48
                                                                Start date:25/11/2024
                                                                Path:C:\Users\user\Desktop\PO_203-25.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\PO_203-25.exe"
                                                                Imagebase:0x400000
                                                                File size:1'135'960 bytes
                                                                MD5 hash:BCF1B4C359D89892CBDEDDCAC52FD4D7
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3917775500.0000000003EB6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3938127996.000000003414F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.3917775500.0000000003EDC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:28.6%
                                                                  Dynamic/Decrypted Code Coverage:29.3%
                                                                  Signature Coverage:18.7%
                                                                  Total number of Nodes:686
                                                                  Total number of Limit Nodes:15
                                                                  execution_graph 2887 10001000 2890 1000101b 2887->2890 2897 100014bb 2890->2897 2892 10001020 2893 10001024 2892->2893 2894 10001027 GlobalAlloc 2892->2894 2895 100014e2 wsprintfA 2893->2895 2894->2893 2896 10001019 2895->2896 2899 100014c1 2897->2899 2898 100014c7 2898->2892 2899->2898 2900 100014d3 GlobalFree 2899->2900 2900->2892 2901 100010e0 2903 1000110e 2901->2903 2902 100011c4 GlobalFree 2903->2902 2904 100012ad 2 API calls 2903->2904 2905 100011c3 2903->2905 2906 10001155 GlobalAlloc 2903->2906 2907 100011ea GlobalFree 2903->2907 2908 100011b1 GlobalFree 2903->2908 2909 100012d1 lstrcpyA 2903->2909 2904->2903 2905->2902 2906->2903 2907->2903 2908->2903 2909->2903 2910 10002162 2911 100021c0 2910->2911 2912 100021f6 2910->2912 2911->2912 2913 100021d2 GlobalAlloc 2911->2913 2913->2911 2914 100029c3 2915 100029db 2914->2915 2916 10001534 2 API calls 2915->2916 2917 100029f6 2916->2917 2160 1000270b 2161 1000275b 2160->2161 2162 1000271b VirtualProtect 2160->2162 2162->2161 2163 4030ec SetErrorMode GetVersion 2164 403123 2163->2164 2165 403129 2163->2165 2166 4060a5 5 API calls 2164->2166 2251 406037 GetSystemDirectoryA 2165->2251 2166->2165 2168 40313f lstrlenA 2168->2165 2169 40314e 2168->2169 2254 4060a5 GetModuleHandleA 2169->2254 2172 4060a5 5 API calls 2173 40315d #17 OleInitialize SHGetFileInfoA 2172->2173 2260 405d0c lstrcpynA 2173->2260 2175 40319a GetCommandLineA 2261 405d0c lstrcpynA 2175->2261 2177 4031ac GetModuleHandleA 2178 4031c3 2177->2178 2262 4057a9 2178->2262 2181 4032b1 2182 4032c4 GetTempPathA 2181->2182 2266 4030bb 2182->2266 2184 4032dc 2185 4032e0 GetWindowsDirectoryA lstrcatA 2184->2185 2186 403336 DeleteFileA 2184->2186 2189 4030bb 12 API calls 2185->2189 2276 402c66 GetTickCount GetModuleFileNameA 2186->2276 2187 4057a9 CharNextA 2188 4031e7 2187->2188 2188->2181 2188->2187 2192 4032b3 2188->2192 2191 4032fc 2189->2191 2191->2186 2194 403300 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 2191->2194 2394 405d0c lstrcpynA 2192->2394 2193 40334a 2197 4033d0 2193->2197 2202 4057a9 CharNextA 2193->2202 2247 4033e0 2193->2247 2196 4030bb 12 API calls 2194->2196 2200 40332e 2196->2200 2304 40368c 2197->2304 2200->2186 2200->2247 2205 403365 2202->2205 2203 403518 2207 403520 GetCurrentProcess OpenProcessToken 2203->2207 2208 40359a ExitProcess 2203->2208 2204 4033fa 2418 405502 2204->2418 2211 403410 2205->2211 2212 4033ab 2205->2212 2213 40356b 2207->2213 2214 40353b LookupPrivilegeValueA AdjustTokenPrivileges 2207->2214 2360 405485 2211->2360 2395 40586c 2212->2395 2217 4060a5 5 API calls 2213->2217 2214->2213 2220 403572 2217->2220 2223 403587 ExitWindowsEx 2220->2223 2226 403593 2220->2226 2221 403431 lstrcatA lstrcmpiA 2225 40344d 2221->2225 2221->2247 2222 403426 lstrcatA 2222->2221 2223->2208 2223->2226 2229 403452 2225->2229 2230 403459 2225->2230 2426 40140b 2226->2426 2228 4033c5 2410 405d0c lstrcpynA 2228->2410 2363 4053eb CreateDirectoryA 2229->2363 2422 405468 CreateDirectoryA 2230->2422 2235 40345e SetCurrentDirectoryA 2236 403478 2235->2236 2237 40346d 2235->2237 2368 405d0c lstrcpynA 2236->2368 2425 405d0c lstrcpynA 2237->2425 2240 403486 2244 40350c 2240->2244 2248 405d2e 18 API calls 2240->2248 2250 4034f8 CloseHandle 2240->2250 2369 405d2e 2240->2369 2387 405bc7 MoveFileExA 2240->2387 2391 40549d CreateProcessA 2240->2391 2243 4034c4 CopyFileA 2243->2240 2245 405bc7 38 API calls 2244->2245 2245->2247 2411 4035b2 2247->2411 2248->2240 2250->2240 2252 406059 wsprintfA LoadLibraryExA 2251->2252 2252->2168 2255 4060c1 2254->2255 2256 4060cb GetProcAddress 2254->2256 2257 406037 3 API calls 2255->2257 2258 403156 2256->2258 2259 4060c7 2257->2259 2258->2172 2259->2256 2259->2258 2260->2175 2261->2177 2263 4057af 2262->2263 2264 4031d7 CharNextA 2263->2264 2265 4057b5 CharNextA 2263->2265 2264->2188 2265->2263 2429 405f77 2266->2429 2268 4030c7 2269 4030d1 2268->2269 2438 40577e lstrlenA CharPrevA 2268->2438 2269->2184 2272 405468 2 API calls 2273 4030df 2272->2273 2441 4059ae 2273->2441 2445 40597f GetFileAttributesA CreateFileA 2276->2445 2278 402ca6 2302 402cb6 2278->2302 2446 405d0c lstrcpynA 2278->2446 2280 402ccc 2447 4057c5 lstrlenA 2280->2447 2284 402cdd GetFileSize 2285 402dd9 2284->2285 2303 402cf4 2284->2303 2452 402c02 2285->2452 2287 402de2 2289 402e12 GlobalAlloc 2287->2289 2287->2302 2487 4030a4 SetFilePointer 2287->2487 2463 4030a4 SetFilePointer 2289->2463 2291 402e45 2295 402c02 6 API calls 2291->2295 2293 402dfb 2296 40308e ReadFile 2293->2296 2294 402e2d 2464 402e9f 2294->2464 2295->2302 2298 402e06 2296->2298 2298->2289 2298->2302 2299 402c02 6 API calls 2299->2303 2300 402e39 2300->2300 2301 402e76 SetFilePointer 2300->2301 2300->2302 2301->2302 2302->2193 2303->2285 2303->2291 2303->2299 2303->2302 2484 40308e 2303->2484 2305 4060a5 5 API calls 2304->2305 2306 4036a0 2305->2306 2307 4036a6 2306->2307 2308 4036b8 2306->2308 2517 405c6a wsprintfA 2307->2517 2518 405bf3 RegOpenKeyExA 2308->2518 2311 403701 lstrcatA 2314 4036b6 2311->2314 2313 405bf3 3 API calls 2313->2311 2508 403951 2314->2508 2317 40586c 18 API calls 2318 403733 2317->2318 2319 4037bc 2318->2319 2321 405bf3 3 API calls 2318->2321 2320 40586c 18 API calls 2319->2320 2322 4037c2 2320->2322 2324 40375f 2321->2324 2323 4037d2 LoadImageA 2322->2323 2325 405d2e 18 API calls 2322->2325 2326 403878 2323->2326 2327 4037f9 RegisterClassA 2323->2327 2324->2319 2328 40377b lstrlenA 2324->2328 2331 4057a9 CharNextA 2324->2331 2325->2323 2330 40140b 2 API calls 2326->2330 2329 40382f SystemParametersInfoA CreateWindowExA 2327->2329 2359 403882 2327->2359 2332 403789 lstrcmpiA 2328->2332 2333 4037af 2328->2333 2329->2326 2334 40387e 2330->2334 2335 403779 2331->2335 2332->2333 2336 403799 GetFileAttributesA 2332->2336 2337 40577e 3 API calls 2333->2337 2339 403951 19 API calls 2334->2339 2334->2359 2335->2328 2338 4037a5 2336->2338 2340 4037b5 2337->2340 2338->2333 2341 4057c5 2 API calls 2338->2341 2342 40388f 2339->2342 2523 405d0c lstrcpynA 2340->2523 2341->2333 2344 40389b ShowWindow 2342->2344 2345 40391e 2342->2345 2347 406037 3 API calls 2344->2347 2524 404ff7 OleInitialize 2345->2524 2349 4038b3 2347->2349 2348 403924 2350 403940 2348->2350 2351 403928 2348->2351 2352 4038c1 GetClassInfoA 2349->2352 2354 406037 3 API calls 2349->2354 2353 40140b 2 API calls 2350->2353 2358 40140b 2 API calls 2351->2358 2351->2359 2355 4038d5 GetClassInfoA RegisterClassA 2352->2355 2356 4038eb DialogBoxParamA 2352->2356 2353->2359 2354->2352 2355->2356 2357 40140b 2 API calls 2356->2357 2357->2359 2358->2359 2359->2247 2361 4060a5 5 API calls 2360->2361 2362 403415 lstrcatA 2361->2362 2362->2221 2362->2222 2364 403457 2363->2364 2365 40543c GetLastError 2363->2365 2364->2235 2365->2364 2366 40544b SetFileSecurityA 2365->2366 2366->2364 2367 405461 GetLastError 2366->2367 2367->2364 2368->2240 2370 405d3b 2369->2370 2371 405f5e 2370->2371 2374 405ddc GetVersion 2370->2374 2375 405f35 lstrlenA 2370->2375 2378 405d2e 10 API calls 2370->2378 2379 405e54 GetSystemDirectoryA 2370->2379 2380 405bf3 3 API calls 2370->2380 2381 405e67 GetWindowsDirectoryA 2370->2381 2382 405f77 5 API calls 2370->2382 2383 405e9b SHGetSpecialFolderLocation 2370->2383 2384 405d2e 10 API calls 2370->2384 2385 405ede lstrcatA 2370->2385 2539 405c6a wsprintfA 2370->2539 2540 405d0c lstrcpynA 2370->2540 2372 4034b7 DeleteFileA 2371->2372 2541 405d0c lstrcpynA 2371->2541 2372->2240 2372->2243 2374->2370 2375->2370 2378->2375 2379->2370 2380->2370 2381->2370 2382->2370 2383->2370 2386 405eb3 SHGetPathFromIDListA CoTaskMemFree 2383->2386 2384->2370 2385->2370 2386->2370 2388 405be8 2387->2388 2389 405bdb 2387->2389 2388->2240 2542 405a55 lstrcpyA 2389->2542 2392 4054d0 CloseHandle 2391->2392 2393 4054dc 2391->2393 2392->2393 2393->2240 2394->2182 2576 405d0c lstrcpynA 2395->2576 2397 40587d 2577 405817 CharNextA CharNextA 2397->2577 2399 4033b6 2399->2247 2409 405d0c lstrcpynA 2399->2409 2401 405f77 5 API calls 2407 405893 2401->2407 2402 4058be lstrlenA 2403 4058c9 2402->2403 2402->2407 2405 40577e 3 API calls 2403->2405 2406 4058ce GetFileAttributesA 2405->2406 2406->2399 2407->2399 2407->2402 2408 4057c5 2 API calls 2407->2408 2583 406010 FindFirstFileA 2407->2583 2408->2402 2409->2228 2410->2197 2412 4035ca 2411->2412 2413 4035bc CloseHandle 2411->2413 2586 4035f7 2412->2586 2413->2412 2419 405517 2418->2419 2420 403408 ExitProcess 2419->2420 2421 40552b MessageBoxIndirectA 2419->2421 2421->2420 2423 405478 2422->2423 2424 40547c GetLastError 2422->2424 2423->2235 2424->2423 2425->2236 2427 401389 2 API calls 2426->2427 2428 401420 2427->2428 2428->2208 2435 405f83 2429->2435 2430 405feb 2431 405fef CharPrevA 2430->2431 2433 40600a 2430->2433 2431->2430 2432 405fe0 CharNextA 2432->2430 2432->2435 2433->2268 2434 4057a9 CharNextA 2434->2435 2435->2430 2435->2432 2435->2434 2436 405fce CharNextA 2435->2436 2437 405fdb CharNextA 2435->2437 2436->2435 2437->2432 2439 4030d9 2438->2439 2440 405798 lstrcatA 2438->2440 2439->2272 2440->2439 2442 4059b9 GetTickCount GetTempFileNameA 2441->2442 2443 4030ea 2442->2443 2444 4059e6 2442->2444 2443->2184 2444->2442 2444->2443 2445->2278 2446->2280 2448 4057d2 2447->2448 2449 402cd2 2448->2449 2450 4057d7 CharPrevA 2448->2450 2451 405d0c lstrcpynA 2449->2451 2450->2448 2450->2449 2451->2284 2453 402c23 2452->2453 2454 402c0b 2452->2454 2457 402c33 GetTickCount 2453->2457 2458 402c2b 2453->2458 2455 402c14 DestroyWindow 2454->2455 2456 402c1b 2454->2456 2455->2456 2456->2287 2459 402c41 CreateDialogParamA ShowWindow 2457->2459 2460 402c64 2457->2460 2488 4060e1 2458->2488 2459->2460 2460->2287 2463->2294 2466 402eb5 2464->2466 2465 402ee3 2468 40308e ReadFile 2465->2468 2466->2465 2505 4030a4 SetFilePointer 2466->2505 2469 402eee 2468->2469 2470 402f00 GetTickCount 2469->2470 2471 403027 2469->2471 2479 403011 2469->2479 2470->2479 2482 402f2c 2470->2482 2472 403069 2471->2472 2476 40302b 2471->2476 2474 40308e ReadFile 2472->2474 2473 40308e ReadFile 2473->2482 2474->2479 2475 40308e ReadFile 2475->2476 2476->2475 2477 405a26 WriteFile 2476->2477 2476->2479 2477->2476 2478 402f82 GetTickCount 2478->2482 2479->2300 2480 402fa7 MulDiv wsprintfA 2492 404f25 2480->2492 2482->2473 2482->2478 2482->2479 2482->2480 2503 405a26 WriteFile 2482->2503 2506 4059f7 ReadFile 2484->2506 2487->2293 2489 4060fe PeekMessageA 2488->2489 2490 4060f4 DispatchMessageA 2489->2490 2491 402c31 2489->2491 2490->2489 2491->2287 2493 404f40 2492->2493 2501 404fe3 2492->2501 2494 404f5d lstrlenA 2493->2494 2495 405d2e 18 API calls 2493->2495 2496 404f86 2494->2496 2497 404f6b lstrlenA 2494->2497 2495->2494 2499 404f99 2496->2499 2500 404f8c SetWindowTextA 2496->2500 2498 404f7d lstrcatA 2497->2498 2497->2501 2498->2496 2499->2501 2502 404f9f SendMessageA SendMessageA SendMessageA 2499->2502 2500->2499 2501->2482 2502->2501 2504 405a44 2503->2504 2504->2482 2505->2465 2507 4030a1 2506->2507 2507->2303 2509 403965 2508->2509 2531 405c6a wsprintfA 2509->2531 2511 4039d6 2512 405d2e 18 API calls 2511->2512 2513 4039e2 SetWindowTextA 2512->2513 2514 403711 2513->2514 2515 4039fe 2513->2515 2514->2317 2515->2514 2516 405d2e 18 API calls 2515->2516 2516->2515 2517->2314 2519 4036e3 2518->2519 2520 405c26 RegQueryValueExA 2518->2520 2519->2311 2519->2313 2521 405c47 RegCloseKey 2520->2521 2521->2519 2523->2319 2532 403f3d 2524->2532 2526 40501a 2530 405041 2526->2530 2535 401389 2526->2535 2527 403f3d SendMessageA 2528 405053 OleUninitialize 2527->2528 2528->2348 2530->2527 2531->2511 2533 403f55 2532->2533 2534 403f46 SendMessageA 2532->2534 2533->2526 2534->2533 2536 401390 2535->2536 2537 4013fe 2536->2537 2538 4013cb MulDiv SendMessageA 2536->2538 2537->2526 2538->2536 2539->2370 2540->2370 2541->2372 2543 405aa3 GetShortPathNameA 2542->2543 2544 405a7d 2542->2544 2546 405bc2 2543->2546 2547 405ab8 2543->2547 2569 40597f GetFileAttributesA CreateFileA 2544->2569 2546->2388 2547->2546 2549 405ac0 wsprintfA 2547->2549 2548 405a87 CloseHandle GetShortPathNameA 2548->2546 2550 405a9b 2548->2550 2551 405d2e 18 API calls 2549->2551 2550->2543 2550->2546 2552 405ae8 2551->2552 2570 40597f GetFileAttributesA CreateFileA 2552->2570 2554 405af5 2554->2546 2555 405b04 GetFileSize GlobalAlloc 2554->2555 2556 405b26 2555->2556 2557 405bbb CloseHandle 2555->2557 2558 4059f7 ReadFile 2556->2558 2557->2546 2559 405b2e 2558->2559 2559->2557 2571 4058e4 lstrlenA 2559->2571 2562 405b45 lstrcpyA 2567 405b67 2562->2567 2563 405b59 2564 4058e4 4 API calls 2563->2564 2564->2567 2565 405b9e SetFilePointer 2566 405a26 WriteFile 2565->2566 2568 405bb4 GlobalFree 2566->2568 2567->2565 2568->2557 2569->2548 2570->2554 2572 405925 lstrlenA 2571->2572 2573 40592d 2572->2573 2574 4058fe lstrcmpiA 2572->2574 2573->2562 2573->2563 2574->2573 2575 40591c CharNextA 2574->2575 2575->2572 2576->2397 2578 405832 2577->2578 2580 405842 2577->2580 2579 40583d CharNextA 2578->2579 2578->2580 2582 405862 2579->2582 2581 4057a9 CharNextA 2580->2581 2580->2582 2581->2580 2582->2399 2582->2401 2584 406031 2583->2584 2585 406026 FindClose 2583->2585 2584->2407 2585->2584 2587 403605 2586->2587 2588 4035cf 2587->2588 2589 40360a FreeLibrary GlobalFree 2587->2589 2590 4055ae 2588->2590 2589->2588 2589->2589 2591 40586c 18 API calls 2590->2591 2592 4055ce 2591->2592 2593 4055d6 DeleteFileA 2592->2593 2594 4055ed 2592->2594 2595 4033e9 OleUninitialize 2593->2595 2600 40571b 2594->2600 2630 405d0c lstrcpynA 2594->2630 2595->2203 2595->2204 2597 405613 2598 405626 2597->2598 2599 405619 lstrcatA 2597->2599 2602 4057c5 2 API calls 2598->2602 2604 40562c 2599->2604 2600->2595 2601 406010 2 API calls 2600->2601 2603 40573f 2601->2603 2602->2604 2603->2595 2606 405743 2603->2606 2605 40563a lstrcatA 2604->2605 2607 405645 lstrlenA FindFirstFileA 2604->2607 2605->2607 2608 40577e 3 API calls 2606->2608 2607->2600 2612 405669 2607->2612 2609 405749 2608->2609 2611 405566 5 API calls 2609->2611 2610 4057a9 CharNextA 2610->2612 2613 405755 2611->2613 2612->2610 2616 4056fa FindNextFileA 2612->2616 2624 4055ae 62 API calls 2612->2624 2626 4056c4 2612->2626 2631 405d0c lstrcpynA 2612->2631 2614 405759 2613->2614 2615 40576f 2613->2615 2614->2595 2620 404f25 25 API calls 2614->2620 2618 404f25 25 API calls 2615->2618 2616->2612 2619 405712 FindClose 2616->2619 2618->2595 2619->2600 2621 405766 2620->2621 2622 405bc7 38 API calls 2621->2622 2625 40576d 2622->2625 2624->2626 2625->2595 2626->2616 2627 404f25 25 API calls 2626->2627 2628 404f25 25 API calls 2626->2628 2629 405bc7 38 API calls 2626->2629 2632 405566 2626->2632 2627->2616 2628->2626 2629->2626 2630->2597 2631->2612 2640 40595a GetFileAttributesA 2632->2640 2635 405593 2635->2626 2636 405581 RemoveDirectoryA 2638 40558f 2636->2638 2637 405589 DeleteFileA 2637->2638 2638->2635 2639 40559f SetFileAttributesA 2638->2639 2639->2635 2641 405572 2640->2641 2642 40596c SetFileAttributesA 2640->2642 2641->2635 2641->2636 2641->2637 2642->2641 2918 1000180d 2919 10001830 2918->2919 2920 10001860 GlobalFree 2919->2920 2921 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 2919->2921 2920->2921 2922 100019e3 GlobalFree GlobalFree 2921->2922 2923 100015b3 2924 100014bb GlobalFree 2923->2924 2926 100015cb 2924->2926 2925 10001611 GlobalFree 2926->2925 2927 100015e6 2926->2927 2928 100015fd VirtualFree 2926->2928 2927->2925 2928->2925 2929 10001058 2931 10001074 2929->2931 2930 100010dc 2931->2930 2932 10001091 2931->2932 2933 100014bb GlobalFree 2931->2933 2934 100014bb GlobalFree 2932->2934 2933->2932 2935 100010a1 2934->2935 2936 100010b1 2935->2936 2937 100010a8 GlobalSize 2935->2937 2938 100010b5 GlobalAlloc 2936->2938 2939 100010c6 2936->2939 2937->2936 2940 100014e2 wsprintfA 2938->2940 2941 100010d1 GlobalFree 2939->2941 2940->2939 2941->2930 2942 1000161a 2943 10001649 2942->2943 2944 10001a5d 18 API calls 2943->2944 2945 10001650 2944->2945 2946 1000168a 2945->2946 2947 1000166d 2945->2947 2952 10001657 2945->2952 2949 10001690 2946->2949 2950 100016b4 2946->2950 2948 100014e2 wsprintfA 2947->2948 2954 10001672 2948->2954 2951 10001559 3 API calls 2949->2951 2953 100014e2 wsprintfA 2950->2953 2955 10001695 2951->2955 2953->2952 2956 10001559 3 API calls 2954->2956 2958 1000169b GlobalFree 2955->2958 2957 10001678 2956->2957 2960 1000167e GlobalFree 2957->2960 2958->2952 2959 100016af GlobalFree 2958->2959 2959->2952 2960->2952 2643 100016bd 2644 100016ed 2643->2644 2684 10001a5d 2644->2684 2646 100016f4 2647 1000180a 2646->2647 2648 10001705 2646->2648 2649 1000170c 2646->2649 2733 100021b0 2648->2733 2716 100021fa 2649->2716 2654 10001770 2659 100017b2 2654->2659 2660 10001776 2654->2660 2655 10001752 2746 100023da 2655->2746 2656 10001722 2658 10001728 2656->2658 2663 10001733 2656->2663 2657 1000173b 2669 10001731 2657->2669 2743 10002aa3 2657->2743 2658->2669 2727 100027e8 2658->2727 2667 100023da 9 API calls 2659->2667 2665 10001559 3 API calls 2660->2665 2662 10001758 2756 10001559 2662->2756 2737 10002589 2663->2737 2671 1000178c 2665->2671 2675 100017a4 2667->2675 2669->2654 2669->2655 2674 100023da 9 API calls 2671->2674 2672 1000175e 2678 10001764 GlobalFree 2672->2678 2673 10001739 2673->2669 2674->2675 2676 100017f9 2675->2676 2764 100023a0 2675->2764 2676->2647 2679 10001803 GlobalFree 2676->2679 2678->2675 2679->2647 2681 100017e5 2681->2676 2768 100014e2 wsprintfA 2681->2768 2682 100017de FreeLibrary 2682->2681 2770 10001215 GlobalAlloc 2684->2770 2686 10001a81 2771 10001215 GlobalAlloc 2686->2771 2688 10001cbb GlobalFree GlobalFree GlobalFree 2689 10001cd8 2688->2689 2707 10001d22 2688->2707 2690 1000201a 2689->2690 2699 10001ced 2689->2699 2689->2707 2692 1000203c GetModuleHandleA 2690->2692 2690->2707 2691 10001b60 GlobalAlloc 2710 10001a8c 2691->2710 2694 10002062 2692->2694 2695 1000204d LoadLibraryA 2692->2695 2693 10001bc9 GlobalFree 2693->2710 2778 100015a4 GetProcAddress 2694->2778 2695->2694 2695->2707 2696 10001bab lstrcpyA 2697 10001bb5 lstrcpyA 2696->2697 2697->2710 2699->2707 2774 10001224 2699->2774 2700 100020b3 2701 100020c0 lstrlenA 2700->2701 2700->2707 2779 100015a4 GetProcAddress 2701->2779 2703 10001f7a 2706 10001fbe lstrcpyA 2703->2706 2703->2707 2706->2707 2707->2646 2708 10002074 2708->2700 2715 1000209d GetProcAddress 2708->2715 2709 100020d9 2709->2707 2710->2688 2710->2691 2710->2693 2710->2696 2710->2697 2710->2703 2710->2707 2711 10001c07 2710->2711 2712 10001e75 GlobalFree 2710->2712 2714 10001224 2 API calls 2710->2714 2777 10001215 GlobalAlloc 2710->2777 2711->2710 2772 10001534 GlobalSize GlobalAlloc 2711->2772 2712->2710 2714->2710 2715->2700 2725 10002212 2716->2725 2717 10001224 GlobalAlloc lstrcpynA 2717->2725 2719 10002349 GlobalFree 2722 10001712 2719->2722 2719->2725 2720 100022b9 GlobalAlloc MultiByteToWideChar 2723 10002303 2720->2723 2724 100022e3 GlobalAlloc CLSIDFromString GlobalFree 2720->2724 2721 1000230a lstrlenA 2721->2719 2721->2723 2722->2656 2722->2657 2722->2669 2723->2719 2785 1000251d 2723->2785 2724->2719 2725->2717 2725->2719 2725->2720 2725->2721 2781 100012ad 2725->2781 2729 100027fa 2727->2729 2728 1000289f SetFilePointer 2730 100028bd 2728->2730 2729->2728 2731 100029b9 2730->2731 2732 100029ae GetLastError 2730->2732 2731->2669 2732->2731 2734 100021c0 2733->2734 2736 1000170b 2733->2736 2735 100021d2 GlobalAlloc 2734->2735 2734->2736 2735->2734 2736->2649 2738 100025a5 2737->2738 2739 100025f6 GlobalAlloc 2738->2739 2740 10002609 2738->2740 2742 10002618 2739->2742 2741 1000260e GlobalSize 2740->2741 2740->2742 2741->2742 2742->2673 2744 10002aae 2743->2744 2745 10002aee GlobalFree 2744->2745 2788 10001215 GlobalAlloc 2746->2788 2748 1000243a lstrcpynA 2754 100023e6 2748->2754 2749 1000244b StringFromGUID2 WideCharToMultiByte 2749->2754 2750 1000246f WideCharToMultiByte 2750->2754 2751 10002490 wsprintfA 2751->2754 2752 100024b4 GlobalFree 2752->2754 2753 100024ee GlobalFree 2753->2662 2754->2748 2754->2749 2754->2750 2754->2751 2754->2752 2754->2753 2789 100012d1 2754->2789 2793 10001215 GlobalAlloc 2756->2793 2758 1000155f 2759 10001586 2758->2759 2760 1000156c lstrcpyA 2758->2760 2762 100015a0 2759->2762 2763 1000158b wsprintfA 2759->2763 2760->2762 2762->2672 2763->2762 2765 100017c5 2764->2765 2766 100023ae 2764->2766 2765->2681 2765->2682 2766->2765 2767 100023c7 GlobalFree 2766->2767 2767->2766 2769 10001503 2768->2769 2769->2676 2770->2686 2771->2710 2773 10001552 2772->2773 2773->2711 2780 10001215 GlobalAlloc 2774->2780 2776 10001233 lstrcpynA 2776->2707 2777->2710 2778->2708 2779->2709 2780->2776 2782 100012b4 2781->2782 2783 10001224 2 API calls 2782->2783 2784 100012cf 2783->2784 2784->2725 2786 10002581 2785->2786 2787 1000252b VirtualAlloc 2785->2787 2786->2723 2787->2786 2788->2754 2790 100012f9 2789->2790 2791 100012da 2789->2791 2790->2754 2791->2790 2792 100012e0 lstrcpyA 2791->2792 2792->2790 2793->2758 2961 1000103d 2962 1000101b 3 API calls 2961->2962 2963 10001056 2962->2963 2794 403a1e 2795 403b71 2794->2795 2796 403a36 2794->2796 2797 403b82 GetDlgItem GetDlgItem 2795->2797 2798 403bc2 2795->2798 2796->2795 2799 403a42 2796->2799 2800 403ef1 19 API calls 2797->2800 2801 403c1c 2798->2801 2811 401389 2 API calls 2798->2811 2802 403a60 2799->2802 2803 403a4d SetWindowPos 2799->2803 2806 403bac SetClassLongA 2800->2806 2807 403f3d SendMessageA 2801->2807 2827 403b6c 2801->2827 2804 403a65 ShowWindow 2802->2804 2805 403a7d 2802->2805 2803->2802 2804->2805 2808 403a85 DestroyWindow 2805->2808 2809 403a9f 2805->2809 2810 40140b 2 API calls 2806->2810 2821 403c2e 2807->2821 2863 403e7a 2808->2863 2812 403aa4 SetWindowLongA 2809->2812 2813 403ab5 2809->2813 2810->2798 2814 403bf4 2811->2814 2812->2827 2817 403ac1 GetDlgItem 2813->2817 2818 403b5e 2813->2818 2814->2801 2819 403bf8 SendMessageA 2814->2819 2815 40140b 2 API calls 2815->2821 2816 403e7c DestroyWindow EndDialog 2816->2863 2822 403af1 2817->2822 2823 403ad4 SendMessageA IsWindowEnabled 2817->2823 2873 403f58 2818->2873 2819->2827 2820 403eab ShowWindow 2820->2827 2821->2815 2821->2816 2825 405d2e 18 API calls 2821->2825 2821->2827 2837 403ef1 19 API calls 2821->2837 2854 403dbc DestroyWindow 2821->2854 2864 403ef1 2821->2864 2826 403af6 2822->2826 2828 403afe 2822->2828 2830 403b45 SendMessageA 2822->2830 2831 403b11 2822->2831 2823->2822 2823->2827 2825->2821 2870 403eca 2826->2870 2828->2826 2828->2830 2830->2818 2832 403b19 2831->2832 2833 403b2e 2831->2833 2835 40140b 2 API calls 2832->2835 2836 40140b 2 API calls 2833->2836 2834 403b2c 2834->2818 2835->2826 2838 403b35 2836->2838 2837->2821 2838->2818 2838->2826 2840 403ca9 GetDlgItem 2841 403cc6 ShowWindow KiUserCallbackDispatcher 2840->2841 2842 403cbe 2840->2842 2867 403f13 KiUserCallbackDispatcher 2841->2867 2842->2841 2844 403cf0 EnableWindow 2847 403d04 2844->2847 2845 403d09 GetSystemMenu EnableMenuItem SendMessageA 2846 403d39 SendMessageA 2845->2846 2845->2847 2846->2847 2847->2845 2868 403f26 SendMessageA 2847->2868 2869 405d0c lstrcpynA 2847->2869 2850 403d67 lstrlenA 2851 405d2e 18 API calls 2850->2851 2852 403d78 SetWindowTextA 2851->2852 2853 401389 2 API calls 2852->2853 2853->2821 2855 403dd6 CreateDialogParamA 2854->2855 2854->2863 2856 403e09 2855->2856 2855->2863 2857 403ef1 19 API calls 2856->2857 2858 403e14 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2857->2858 2859 401389 2 API calls 2858->2859 2860 403e5a 2859->2860 2860->2827 2861 403e62 ShowWindow 2860->2861 2862 403f3d SendMessageA 2861->2862 2862->2863 2863->2820 2863->2827 2865 405d2e 18 API calls 2864->2865 2866 403efc SetDlgItemTextA 2865->2866 2866->2840 2867->2844 2868->2847 2869->2850 2871 403ed1 2870->2871 2872 403ed7 SendMessageA 2870->2872 2871->2872 2872->2834 2874 403f70 GetWindowLongA 2873->2874 2884 403ff9 2873->2884 2875 403f81 2874->2875 2874->2884 2876 403f90 GetSysColor 2875->2876 2877 403f93 2875->2877 2876->2877 2878 403fa3 SetBkMode 2877->2878 2879 403f99 SetTextColor 2877->2879 2880 403fc1 2878->2880 2881 403fbb GetSysColor 2878->2881 2879->2878 2882 403fd2 2880->2882 2883 403fc8 SetBkColor 2880->2883 2881->2880 2882->2884 2885 403fe5 DeleteObject 2882->2885 2886 403fec CreateBrushIndirect 2882->2886 2883->2882 2884->2827 2885->2886 2886->2884 2964 402b7f 2965 402ba7 2964->2965 2966 402b8e SetTimer 2964->2966 2967 402bfc 2965->2967 2968 402bc1 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 2965->2968 2966->2965 2968->2967

                                                                  Callgraph

                                                                  • Executed
                                                                  • Not Executed
                                                                  • Opacity -> Relevance
                                                                  • Disassembly available
                                                                  callgraph 0 Function_10001000 11 Function_1000101B 0->11 1 Function_10001508 2 Function_1000270B 3 Function_1000180D 4 Function_10002C10 3->4 14 Function_10002B20 3->14 20 Function_10001429 3->20 26 Function_1000123B 3->26 45 Function_10002B60 3->45 105 Function_10002CD0 3->105 119 Function_10002CF0 3->119 124 Function_100012FE 3->124 5 Function_00403951 21 Function_00405C6A 5->21 53 Function_00405D2E 5->53 96 Function_00405C83 5->96 6 Function_00405A55 29 Function_0040597F 6->29 51 Function_00405A26 6->51 6->53 57 Function_0040593A 6->57 74 Function_004058E4 6->74 87 Function_004059F7 6->87 7 Function_10001215 8 Function_00403F58 9 Function_0040595A 10 Function_1000161A 41 Function_10001559 10->41 43 Function_10001A5D 10->43 112 Function_100014E2 10->112 92 Function_100014BB 11->92 11->112 12 Function_00406C5D 13 Function_1000251D 15 Function_10002D20 16 Function_10001224 16->7 17 Function_00402C66 17->29 31 Function_00402C02 17->31 34 Function_00405D0C 17->34 42 Function_0040611A 17->42 17->57 60 Function_004057C5 17->60 103 Function_0040308E 17->103 110 Function_00402E9F 17->110 113 Function_004030A4 17->113 18 Function_00405566 18->9 19 Function_00405468 20->4 20->45 22 Function_0040586C 25 Function_00405F77 22->25 28 Function_0040577E 22->28 22->34 35 Function_00406010 22->35 39 Function_00405817 22->39 22->60 23 Function_0040136D 23->96 24 Function_10001534 24->1 25->57 78 Function_004057EB 25->78 116 Function_004057A9 25->116 27 Function_1000103D 27->11 30 Function_00402B7F 71 Function_004060E1 31->71 32 Function_00405502 33 Function_0040140B 101 Function_00401389 33->101 36 Function_10001A50 36->124 37 Function_00403F13 38 Function_10001556 39->116 40 Function_10001058 40->1 40->26 40->92 40->112 40->124 41->7 43->7 43->16 43->20 43->24 43->26 75 Function_100015A4 43->75 123 Function_100019FB 43->123 43->124 44 Function_00403A1E 44->8 44->33 44->34 44->37 50 Function_00403F26 44->50 44->53 58 Function_00403F3D 44->58 63 Function_00403ECA 44->63 83 Function_00403EF1 44->83 44->101 46 Function_10002761 47 Function_10002162 48 Function_00404F25 48->53 49 Function_00406325 49->12 69 Function_00406CDE 49->69 90 Function_00406BF8 49->90 52 Function_10002767 53->21 53->25 53->34 53->53 84 Function_00405BF3 53->84 54 Function_00401434 55 Function_10002775 56 Function_00406037 59 Function_10002783 61 Function_00405BC7 61->6 62 Function_10002589 62->1 64 Function_10002791 65 Function_10002797 66 Function_004035DC 67 Function_004061DD 68 Function_1000279D 70 Function_100023A0 72 Function_10002AA3 72->55 72->68 81 Function_100027AE 72->81 93 Function_100027BC 72->93 95 Function_100027C0 72->95 73 Function_100027A3 76 Function_100012A7 77 Function_004053EB 79 Function_004030EC 79->17 79->19 79->22 79->32 79->33 79->34 79->53 79->56 79->61 79->77 99 Function_00405485 79->99 102 Function_0040368C 79->102 109 Function_0040549D 79->109 114 Function_004060A5 79->114 79->116 120 Function_004035B2 79->120 122 Function_004030BB 79->122 80 Function_100012AD 80->16 82 Function_100021B0 83->53 85 Function_100015B3 85->92 86 Function_100027B4 88 Function_004035F7 88->66 89 Function_00404FF7 89->58 89->101 91 Function_100027B8 92->26 92->124 94 Function_100016BD 94->41 94->43 94->62 94->70 94->72 94->82 108 Function_100023DA 94->108 94->112 115 Function_100027E8 94->115 121 Function_100021FA 94->121 97 Function_100029C3 97->24 97->65 97->68 97->73 97->81 97->86 97->91 97->93 97->95 98 Function_100027C4 97->98 107 Function_100027D9 97->107 99->114 100 Function_00406188 100->49 100->67 101->23 101->54 102->5 102->21 102->22 102->28 102->33 102->34 102->53 102->56 102->60 102->66 102->84 102->89 102->114 102->116 103->87 104 Function_100027D0 106 Function_100012D1 108->7 108->20 108->106 110->48 110->51 110->100 110->103 110->113 111 Function_100010E0 111->1 111->26 111->80 111->106 114->56 115->15 115->46 115->52 115->55 115->59 115->64 115->65 115->73 115->81 115->86 115->91 115->93 115->95 115->104 117 Function_004059AE 118 Function_004055AE 118->18 118->22 118->28 118->34 118->35 118->48 118->60 118->61 118->116 118->118 120->88 120->118 121->13 121->16 121->20 121->26 121->80 121->124 122->19 122->25 122->28 122->78 122->117 124->14 124->124

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 4030ec-403121 SetErrorMode GetVersion 1 403123-40312b call 4060a5 0->1 2 403134 0->2 1->2 7 40312d 1->7 4 403139-40314c call 406037 lstrlenA 2->4 9 40314e-4031c1 call 4060a5 * 2 #17 OleInitialize SHGetFileInfoA call 405d0c GetCommandLineA call 405d0c GetModuleHandleA 4->9 7->2 18 4031c3-4031c8 9->18 19 4031cd-4031e2 call 4057a9 CharNextA 9->19 18->19 22 4032a7-4032ab 19->22 23 4032b1 22->23 24 4031e7-4031ea 22->24 27 4032c4-4032de GetTempPathA call 4030bb 23->27 25 4031f2-4031fa 24->25 26 4031ec-4031f0 24->26 29 403202-403205 25->29 30 4031fc-4031fd 25->30 26->25 26->26 34 4032e0-4032fe GetWindowsDirectoryA lstrcatA call 4030bb 27->34 35 403336-403350 DeleteFileA call 402c66 27->35 32 403297-4032a4 call 4057a9 29->32 33 40320b-40320f 29->33 30->29 32->22 51 4032a6 32->51 37 403211-403217 33->37 38 403227-403254 33->38 34->35 52 403300-403330 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4030bb 34->52 53 4033e4-4033f4 call 4035b2 OleUninitialize 35->53 54 403356-40335c 35->54 39 403219-40321b 37->39 40 40321d 37->40 42 403256-40325c 38->42 43 403267-403295 38->43 39->38 39->40 40->38 47 403262 42->47 48 40325e-403260 42->48 43->32 49 4032b3-4032bf call 405d0c 43->49 47->43 48->43 48->47 49->27 51->22 52->35 52->53 64 403518-40351e 53->64 65 4033fa-40340a call 405502 ExitProcess 53->65 57 4033d4-4033db call 40368c 54->57 58 40335e-403369 call 4057a9 54->58 66 4033e0 57->66 71 40336b-403394 58->71 72 40339f-4033a9 58->72 69 403520-403539 GetCurrentProcess OpenProcessToken 64->69 70 40359a-4035a2 64->70 66->53 79 40356b-403579 call 4060a5 69->79 80 40353b-403565 LookupPrivilegeValueA AdjustTokenPrivileges 69->80 74 4035a4 70->74 75 4035a8-4035ac ExitProcess 70->75 73 403396-403398 71->73 77 403410-403424 call 405485 lstrcatA 72->77 78 4033ab-4033b8 call 40586c 72->78 73->72 81 40339a-40339d 73->81 74->75 89 403431-40344b lstrcatA lstrcmpiA 77->89 90 403426-40342c lstrcatA 77->90 78->53 88 4033ba-4033d0 call 405d0c * 2 78->88 91 403587-403591 ExitWindowsEx 79->91 92 40357b-403585 79->92 80->79 81->72 81->73 88->57 89->53 94 40344d-403450 89->94 90->89 91->70 95 403593-403595 call 40140b 91->95 92->91 92->95 98 403452 call 4053eb 94->98 99 403459 call 405468 94->99 95->70 105 403457 98->105 106 40345e-40346b SetCurrentDirectoryA 99->106 105->106 107 403478-4034a0 call 405d0c 106->107 108 40346d-403473 call 405d0c 106->108 112 4034a6-4034c2 call 405d2e DeleteFileA 107->112 108->107 115 403503-40350a 112->115 116 4034c4-4034d4 CopyFileA 112->116 115->112 117 40350c-403513 call 405bc7 115->117 116->115 118 4034d6-4034ef call 405bc7 call 405d2e call 40549d 116->118 117->53 126 4034f4-4034f6 118->126 126->115 127 4034f8-4034ff CloseHandle 126->127 127->115
                                                                  APIs
                                                                  • SetErrorMode.KERNELBASE ref: 00403111
                                                                  • GetVersion.KERNEL32 ref: 00403117
                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403140
                                                                  • #17.COMCTL32(00000007,00000009), ref: 00403162
                                                                  • OleInitialize.OLE32(00000000), ref: 00403169
                                                                  • SHGetFileInfoA.SHELL32(0079D500,00000000,?,00000160,00000000), ref: 00403185
                                                                  • GetCommandLineA.KERNEL32(molarimeter Setup,NSIS Error), ref: 0040319A
                                                                  • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\PO_203-25.exe",00000000), ref: 004031AD
                                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\PO_203-25.exe",00000020), ref: 004031D8
                                                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004032D5
                                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004032E6
                                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032F2
                                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403306
                                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040330E
                                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040331F
                                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403327
                                                                  • DeleteFileA.KERNELBASE(1033), ref: 0040333B
                                                                    • Part of subcall function 004060A5: GetModuleHandleA.KERNEL32(?,?,?,00403156,00000009), ref: 004060B7
                                                                    • Part of subcall function 004060A5: GetProcAddress.KERNEL32(00000000,?), ref: 004060D2
                                                                  • OleUninitialize.OLE32(?), ref: 004033E9
                                                                  • ExitProcess.KERNEL32 ref: 0040340A
                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403527
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040352E
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403546
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403565
                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403589
                                                                  • ExitProcess.KERNEL32 ref: 004035AC
                                                                    • Part of subcall function 00405502: MessageBoxIndirectA.USER32(00409218), ref: 0040555D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                                                                  • String ID: "$"C:\Users\user\Desktop\PO_203-25.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PO_203-25.exe$C:\Users\user\eksterirerne\Kommissorier30\sonderer$C:\Users\user\eksterirerne\Kommissorier30\sonderer$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$molarimeter Setup$~nsu
                                                                  • API String ID: 3329125770-4169064611
                                                                  • Opcode ID: c6611ae9ac11e23741c835f25bc01884f32e14d02a86914436eec919e11b29ea
                                                                  • Instruction ID: 9f005f8ea334ebed05284af4b2fd35d6cfc3abe5f946e81cdcf7347df6e605c8
                                                                  • Opcode Fuzzy Hash: c6611ae9ac11e23741c835f25bc01884f32e14d02a86914436eec919e11b29ea
                                                                  • Instruction Fuzzy Hash: 02C1D7705082816AE7116F75AD4DA2F7EACAF8634AF04457FF541B61E2CB7C4A048B2E
                                                                  APIs
                                                                    • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                                  • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 10001B67
                                                                  • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                                                                  • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                                                                  • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                                                                  • GlobalFree.KERNEL32(?), ref: 10001CC4
                                                                  • GlobalFree.KERNEL32(?), ref: 10001CC9
                                                                  • GlobalFree.KERNEL32(?), ref: 10001CCE
                                                                  • GlobalFree.KERNEL32(00000000), ref: 10001E76
                                                                  • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$lstrcpy$Alloc
                                                                  • String ID:
                                                                  • API String ID: 4227406936-0
                                                                  • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                                                  • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                                                                  • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                                                  • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 634 4055ae-4055d4 call 40586c 637 4055d6-4055e8 DeleteFileA 634->637 638 4055ed-4055f4 634->638 639 405777-40577b 637->639 640 4055f6-4055f8 638->640 641 405607-405617 call 405d0c 638->641 642 405725-40572a 640->642 643 4055fe-405601 640->643 647 405626-405627 call 4057c5 641->647 648 405619-405624 lstrcatA 641->648 642->639 646 40572c-40572f 642->646 643->641 643->642 649 405731-405737 646->649 650 405739-405741 call 406010 646->650 652 40562c-40562f 647->652 648->652 649->639 650->639 657 405743-405757 call 40577e call 405566 650->657 655 405631-405638 652->655 656 40563a-405640 lstrcatA 652->656 655->656 658 405645-405663 lstrlenA FindFirstFileA 655->658 656->658 673 405759-40575c 657->673 674 40576f-405772 call 404f25 657->674 660 405669-405680 call 4057a9 658->660 661 40571b-40571f 658->661 667 405682-405686 660->667 668 40568b-40568e 660->668 661->642 663 405721 661->663 663->642 667->668 670 405688 667->670 671 405690-405695 668->671 672 4056a1-4056af call 405d0c 668->672 670->668 675 405697-405699 671->675 676 4056fa-40570c FindNextFileA 671->676 684 4056b1-4056b9 672->684 685 4056c6-4056d1 call 405566 672->685 673->649 678 40575e-40576d call 404f25 call 405bc7 673->678 674->639 675->672 680 40569b-40569f 675->680 676->660 682 405712-405715 FindClose 676->682 678->639 680->672 680->676 682->661 684->676 687 4056bb-4056bf call 4055ae 684->687 693 4056f2-4056f5 call 404f25 685->693 694 4056d3-4056d6 685->694 695 4056c4 687->695 693->676 696 4056d8-4056e8 call 404f25 call 405bc7 694->696 697 4056ea-4056f0 694->697 695->676 696->676 697->676
                                                                  APIs
                                                                  • DeleteFileA.KERNELBASE(?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004055D7
                                                                  • lstrcatA.KERNEL32(Overmandede.Bri119,\*.*,Overmandede.Bri119,?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040561F
                                                                  • lstrcatA.KERNEL32(?,00409014,?,Overmandede.Bri119,?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405640
                                                                  • lstrlenA.KERNEL32(?,?,00409014,?,Overmandede.Bri119,?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405646
                                                                  • FindFirstFileA.KERNELBASE(Overmandede.Bri119,?,?,?,00409014,?,Overmandede.Bri119,?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405657
                                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405704
                                                                  • FindClose.KERNEL32(00000000), ref: 00405715
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$C:\Users\user\AppData\Local\Temp\$Overmandede.Bri119$\*.*
                                                                  • API String ID: 2035342205-483975984
                                                                  • Opcode ID: 373598af7c05b798553a0e6d741f8fa9b3fc9b1def23570ded43f9bc43289639
                                                                  • Instruction ID: 15aabf9ae26d8a027305d4c4078bc37ad96aa8a5c182164a2950041f9cf2f42d
                                                                  • Opcode Fuzzy Hash: 373598af7c05b798553a0e6d741f8fa9b3fc9b1def23570ded43f9bc43289639
                                                                  • Instruction Fuzzy Hash: C651DF30800A04BADB21AB618C45BBF7A78DF42355F54857BF449B61D2D73C4981EE6E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 882 406010-406024 FindFirstFileA 883 406031 882->883 884 406026-40602f FindClose 882->884 885 406033-406034 883->885 884->885
                                                                  APIs
                                                                  • FindFirstFileA.KERNELBASE(761336B0,0079FD90,Overmandede.Bri119,004058AF,Overmandede.Bri119,Overmandede.Bri119,00000000,Overmandede.Bri119,Overmandede.Bri119,761336B0,?,C:\Users\user\AppData\Local\Temp\,004055CE,?,761336B0,C:\Users\user\AppData\Local\Temp\), ref: 0040601B
                                                                  • FindClose.KERNELBASE(00000000), ref: 00406027
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Find$CloseFileFirst
                                                                  • String ID: Overmandede.Bri119
                                                                  • API String ID: 2295610775-3323112521
                                                                  • Opcode ID: d30bbc16997dfcf9f9a572ec6341a2188e66bfdc939d37fad3f946c8dc482195
                                                                  • Instruction ID: 592bcfe3733b0aa744bdfcff45d7cd7e76fdd068ce72c1f71716353b7d55c377
                                                                  • Opcode Fuzzy Hash: d30bbc16997dfcf9f9a572ec6341a2188e66bfdc939d37fad3f946c8dc482195
                                                                  • Instruction Fuzzy Hash: 02D012319491305BC714977C7D4C84F7A6C9B193717114A32F46AF12E0C6749CA286E9

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 128 403a1e-403a30 129 403b71-403b80 128->129 130 403a36-403a3c 128->130 131 403b82-403bca GetDlgItem * 2 call 403ef1 SetClassLongA call 40140b 129->131 132 403bcf-403be4 129->132 130->129 133 403a42-403a4b 130->133 131->132 135 403c24-403c29 call 403f3d 132->135 136 403be6-403be9 132->136 137 403a60-403a63 133->137 138 403a4d-403a5a SetWindowPos 133->138 150 403c2e-403c49 135->150 142 403beb-403bf6 call 401389 136->142 143 403c1c-403c1e 136->143 139 403a65-403a77 ShowWindow 137->139 140 403a7d-403a83 137->140 138->137 139->140 145 403a85-403a9a DestroyWindow 140->145 146 403a9f-403aa2 140->146 142->143 164 403bf8-403c17 SendMessageA 142->164 143->135 149 403ebe 143->149 152 403e9b-403ea1 145->152 154 403aa4-403ab0 SetWindowLongA 146->154 155 403ab5-403abb 146->155 151 403ec0-403ec7 149->151 157 403c52-403c58 150->157 158 403c4b-403c4d call 40140b 150->158 152->149 165 403ea3-403ea9 152->165 154->151 162 403ac1-403ad2 GetDlgItem 155->162 163 403b5e-403b6c call 403f58 155->163 160 403e7c-403e95 DestroyWindow EndDialog 157->160 161 403c5e-403c69 157->161 158->157 160->152 161->160 167 403c6f-403cbc call 405d2e call 403ef1 * 3 GetDlgItem 161->167 168 403af1-403af4 162->168 169 403ad4-403aeb SendMessageA IsWindowEnabled 162->169 163->151 164->151 165->149 166 403eab-403eb4 ShowWindow 165->166 166->149 198 403cc6-403d02 ShowWindow KiUserCallbackDispatcher call 403f13 EnableWindow 167->198 199 403cbe-403cc3 167->199 172 403af6-403af7 168->172 173 403af9-403afc 168->173 169->149 169->168 176 403b27-403b2c call 403eca 172->176 177 403b0a-403b0f 173->177 178 403afe-403b04 173->178 176->163 181 403b45-403b58 SendMessageA 177->181 183 403b11-403b17 177->183 178->181 182 403b06-403b08 178->182 181->163 182->176 184 403b19-403b1f call 40140b 183->184 185 403b2e-403b37 call 40140b 183->185 194 403b25 184->194 185->163 195 403b39-403b43 185->195 194->176 195->194 202 403d04-403d05 198->202 203 403d07 198->203 199->198 204 403d09-403d37 GetSystemMenu EnableMenuItem SendMessageA 202->204 203->204 205 403d39-403d4a SendMessageA 204->205 206 403d4c 204->206 207 403d52-403d8b call 403f26 call 405d0c lstrlenA call 405d2e SetWindowTextA call 401389 205->207 206->207 207->150 216 403d91-403d93 207->216 216->150 217 403d99-403d9d 216->217 218 403dbc-403dd0 DestroyWindow 217->218 219 403d9f-403da5 217->219 218->152 221 403dd6-403e03 CreateDialogParamA 218->221 219->149 220 403dab-403db1 219->220 220->150 222 403db7 220->222 221->152 223 403e09-403e60 call 403ef1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 221->223 222->149 223->149 228 403e62-403e75 ShowWindow call 403f3d 223->228 230 403e7a 228->230 230->152
                                                                  APIs
                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A5A
                                                                  • ShowWindow.USER32(?), ref: 00403A77
                                                                  • DestroyWindow.USER32 ref: 00403A8B
                                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403AA7
                                                                  • GetDlgItem.USER32(?,?), ref: 00403AC8
                                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403ADC
                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403AE3
                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403B91
                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403B9B
                                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403BB5
                                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C06
                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403CAC
                                                                  • ShowWindow.USER32(00000000,?), ref: 00403CCD
                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403CDF
                                                                  • EnableWindow.USER32(?,?), ref: 00403CFA
                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D10
                                                                  • EnableMenuItem.USER32(00000000), ref: 00403D17
                                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D2F
                                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D42
                                                                  • lstrlenA.KERNEL32(0079E540,?,0079E540,molarimeter Setup), ref: 00403D6B
                                                                  • SetWindowTextA.USER32(?,0079E540), ref: 00403D7A
                                                                  • ShowWindow.USER32(?,0000000A), ref: 00403EAE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                  • String ID: @y$molarimeter Setup
                                                                  • API String ID: 3282139019-3144318859
                                                                  • Opcode ID: f91631ea6a7899119ed47f58db1b72be55114eb3759132e365ec33f9056147a3
                                                                  • Instruction ID: 604a4885fc931abc1044a41a4cf0f2958d917e977c7d56f4e50accb35e18e33b
                                                                  • Opcode Fuzzy Hash: f91631ea6a7899119ed47f58db1b72be55114eb3759132e365ec33f9056147a3
                                                                  • Instruction Fuzzy Hash: F1C1AE31904205ABEB216F61ED85E2B3EACEB4574AF00453EF501B11F1C739A942DB5E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 231 40368c-4036a4 call 4060a5 234 4036a6-4036b6 call 405c6a 231->234 235 4036b8-4036e9 call 405bf3 231->235 243 40370c-403735 call 403951 call 40586c 234->243 239 403701-403707 lstrcatA 235->239 240 4036eb-4036fc call 405bf3 235->240 239->243 240->239 249 40373b-403740 243->249 250 4037bc-4037c4 call 40586c 243->250 249->250 251 403742-403766 call 405bf3 249->251 255 4037d2-4037f7 LoadImageA 250->255 256 4037c6-4037cd call 405d2e 250->256 251->250 261 403768-40376a 251->261 259 403878-403880 call 40140b 255->259 260 4037f9-403829 RegisterClassA 255->260 256->255 274 403882-403885 259->274 275 40388a-403895 call 403951 259->275 264 403947 260->264 265 40382f-403873 SystemParametersInfoA CreateWindowExA 260->265 262 40377b-403787 lstrlenA 261->262 263 40376c-403779 call 4057a9 261->263 269 403789-403797 lstrcmpiA 262->269 270 4037af-4037b7 call 40577e call 405d0c 262->270 263->262 268 403949-403950 264->268 265->259 269->270 273 403799-4037a3 GetFileAttributesA 269->273 270->250 277 4037a5-4037a7 273->277 278 4037a9-4037aa call 4057c5 273->278 274->268 284 40389b-4038b5 ShowWindow call 406037 275->284 285 40391e-403926 call 404ff7 275->285 277->270 277->278 278->270 292 4038c1-4038d3 GetClassInfoA 284->292 293 4038b7-4038bc call 406037 284->293 290 403940-403942 call 40140b 285->290 291 403928-40392e 285->291 290->264 291->274 298 403934-40393b call 40140b 291->298 296 4038d5-4038e5 GetClassInfoA RegisterClassA 292->296 297 4038eb-40390e DialogBoxParamA call 40140b 292->297 293->292 296->297 301 403913-40391c call 4035dc 297->301 298->274 301->268
                                                                  APIs
                                                                    • Part of subcall function 004060A5: GetModuleHandleA.KERNEL32(?,?,?,00403156,00000009), ref: 004060B7
                                                                    • Part of subcall function 004060A5: GetProcAddress.KERNEL32(00000000,?), ref: 004060D2
                                                                  • lstrcatA.KERNEL32(1033,0079E540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079E540,00000000,00000002,761336B0,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PO_203-25.exe",00000000), ref: 00403707
                                                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eksterirerne\Kommissorier30\sonderer,1033,0079E540,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079E540,00000000,00000002,761336B0), ref: 0040377C
                                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040378F
                                                                  • GetFileAttributesA.KERNEL32(Call), ref: 0040379A
                                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\eksterirerne\Kommissorier30\sonderer), ref: 004037E3
                                                                    • Part of subcall function 00405C6A: wsprintfA.USER32 ref: 00405C77
                                                                  • RegisterClassA.USER32(007A16E0), ref: 00403820
                                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403838
                                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040386D
                                                                  • ShowWindow.USER32(00000005,00000000), ref: 004038A3
                                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,007A16E0), ref: 004038CF
                                                                  • GetClassInfoA.USER32(00000000,RichEdit,007A16E0), ref: 004038DC
                                                                  • RegisterClassA.USER32(007A16E0), ref: 004038E5
                                                                  • DialogBoxParamA.USER32(?,00000000,00403A1E,00000000), ref: 00403904
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$.DEFAULT\Control Panel\International$.exe$1033$@y$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eksterirerne\Kommissorier30\sonderer$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                  • API String ID: 1975747703-3429155490
                                                                  • Opcode ID: 1f1d7b7cedc4fdc1a161c84c86f92609142e4f2c1f25f6f9bda009316c644032
                                                                  • Instruction ID: b6748c6733e3bb55aa357910a2c4fdec813f4d760fd6ac6bc3454eeade69f907
                                                                  • Opcode Fuzzy Hash: 1f1d7b7cedc4fdc1a161c84c86f92609142e4f2c1f25f6f9bda009316c644032
                                                                  • Instruction Fuzzy Hash: D06106B4504244AEE710AF659C45F3B3AACEB85789F00857FF900B22E1D77CAD019B2D

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 305 402c66-402cb4 GetTickCount GetModuleFileNameA call 40597f 308 402cc0-402cee call 405d0c call 4057c5 call 405d0c GetFileSize 305->308 309 402cb6-402cbb 305->309 317 402cf4 308->317 318 402ddb-402de9 call 402c02 308->318 310 402e98-402e9c 309->310 320 402cf9-402d10 317->320 325 402deb-402dee 318->325 326 402e3e-402e43 318->326 321 402d12 320->321 322 402d14-402d1d call 40308e 320->322 321->322 331 402d23-402d2a 322->331 332 402e45-402e4d call 402c02 322->332 328 402df0-402e08 call 4030a4 call 40308e 325->328 329 402e12-402e3c GlobalAlloc call 4030a4 call 402e9f 325->329 326->310 328->326 351 402e0a-402e10 328->351 329->326 356 402e4f-402e60 329->356 335 402da6-402daa 331->335 336 402d2c-402d40 call 40593a 331->336 332->326 340 402db4-402dba 335->340 341 402dac-402db3 call 402c02 335->341 336->340 354 402d42-402d49 336->354 347 402dc9-402dd3 340->347 348 402dbc-402dc6 call 40611a 340->348 341->340 347->320 355 402dd9 347->355 348->347 351->326 351->329 354->340 358 402d4b-402d52 354->358 355->318 359 402e62 356->359 360 402e68-402e6d 356->360 358->340 362 402d54-402d5b 358->362 359->360 361 402e6e-402e74 360->361 361->361 363 402e76-402e91 SetFilePointer call 40593a 361->363 362->340 364 402d5d-402d64 362->364 367 402e96 363->367 364->340 366 402d66-402d86 364->366 366->326 368 402d8c-402d90 366->368 367->310 369 402d92-402d96 368->369 370 402d98-402da0 368->370 369->355 369->370 370->340 371 402da2-402da4 370->371 371->340
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 00402C77
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\PO_203-25.exe,00000400), ref: 00402C93
                                                                    • Part of subcall function 0040597F: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 00405983
                                                                    • Part of subcall function 0040597F: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A5
                                                                  • GetFileSize.KERNEL32(00000000,00000000,007AA000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO_203-25.exe,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 00402CDF
                                                                  Strings
                                                                  • C:\Users\user\Desktop\PO_203-25.exe, xrefs: 00402C7D, 00402C8C, 00402CA0, 00402CC0
                                                                  • C:\Users\user\Desktop, xrefs: 00402CC1, 00402CC6, 00402CCC
                                                                  • soft, xrefs: 00402D54
                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E3E
                                                                  • "C:\Users\user\Desktop\PO_203-25.exe", xrefs: 00402C66
                                                                  • Null, xrefs: 00402D5D
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C6D
                                                                  • Inst, xrefs: 00402D4B
                                                                  • Error launching installer, xrefs: 00402CB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PO_203-25.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                  • API String ID: 4283519449-2459164966
                                                                  • Opcode ID: 48d0b30a573a01b2c2b1968d3d6d53f6fa88bda45e86464b42b605cd2148996d
                                                                  • Instruction ID: fe9ef23653e85685a193ad9c5457c4b2e55d644b791d7b95544962d8ab1ad500
                                                                  • Opcode Fuzzy Hash: 48d0b30a573a01b2c2b1968d3d6d53f6fa88bda45e86464b42b605cd2148996d
                                                                  • Instruction Fuzzy Hash: CC51F471941214AFEB119F65DE89B9E7BA8EF04364F14803BF904B62D1D7BC8D408BAD

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 372 405d2e-405d39 373 405d3b-405d4a 372->373 374 405d4c-405d61 372->374 373->374 375 405f54-405f58 374->375 376 405d67-405d72 374->376 377 405d84-405d8e 375->377 378 405f5e-405f68 375->378 376->375 379 405d78-405d7f 376->379 377->378 382 405d94-405d9b 377->382 380 405f73-405f74 378->380 381 405f6a-405f6e call 405d0c 378->381 379->375 381->380 384 405da1-405dd6 382->384 385 405f47 382->385 386 405ef1-405ef4 384->386 387 405ddc-405de7 GetVersion 384->387 388 405f51-405f53 385->388 389 405f49-405f4f 385->389 392 405f24-405f27 386->392 393 405ef6-405ef9 386->393 390 405e01 387->390 391 405de9-405ded 387->391 388->375 389->375 397 405e08-405e0f 390->397 391->390 394 405def-405df3 391->394 398 405f35-405f45 lstrlenA 392->398 399 405f29-405f30 call 405d2e 392->399 395 405f09-405f15 call 405d0c 393->395 396 405efb-405f07 call 405c6a 393->396 394->390 400 405df5-405df9 394->400 410 405f1a-405f20 395->410 396->410 402 405e11-405e13 397->402 403 405e14-405e16 397->403 398->375 399->398 400->390 406 405dfb-405dff 400->406 402->403 408 405e18-405e33 call 405bf3 403->408 409 405e4f-405e52 403->409 406->397 418 405e38-405e3b 408->418 411 405e62-405e65 409->411 412 405e54-405e60 GetSystemDirectoryA 409->412 410->398 414 405f22 410->414 416 405e67-405e75 GetWindowsDirectoryA 411->416 417 405ecf-405ed1 411->417 415 405ed3-405ed6 412->415 419 405ee9-405eef call 405f77 414->419 415->419 423 405ed8-405edc 415->423 416->417 417->415 421 405e77-405e81 417->421 422 405e41-405e4a call 405d2e 418->422 418->423 419->398 425 405e83-405e86 421->425 426 405e9b-405eb1 SHGetSpecialFolderLocation 421->426 422->415 423->419 428 405ede-405ee4 lstrcatA 423->428 425->426 429 405e88-405e8f 425->429 430 405eb3-405eca SHGetPathFromIDListA CoTaskMemFree 426->430 431 405ecc 426->431 428->419 433 405e97-405e99 429->433 430->415 430->431 431->417 433->415 433->426
                                                                  APIs
                                                                  • GetVersion.KERNEL32(00000006,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000,00404F5D,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000), ref: 00405DDF
                                                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405E5A
                                                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405E6D
                                                                  • SHGetSpecialFolderLocation.SHELL32(?,0078FCF8), ref: 00405EA9
                                                                  • SHGetPathFromIDListA.SHELL32(0078FCF8,Call), ref: 00405EB7
                                                                  • CoTaskMemFree.OLE32(0078FCF8), ref: 00405EC2
                                                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405EE4
                                                                  • lstrlenA.KERNEL32(Call,00000006,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000,00404F5D,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000), ref: 00405F36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                  • API String ID: 900638850-1813670936
                                                                  • Opcode ID: 8aaebd9e83df3b37401bec0d629d687f6ba259a9d136d118ad02b0f801d1bc8a
                                                                  • Instruction ID: 9bfabfc36fba32fb106481ebf294e43342570200e8730ead7ab322b99494356e
                                                                  • Opcode Fuzzy Hash: 8aaebd9e83df3b37401bec0d629d687f6ba259a9d136d118ad02b0f801d1bc8a
                                                                  • Instruction Fuzzy Hash: F7611231904A05ABEF115B24CC84BBF7BA8DB56314F10813BE555BA2D1D33D4A82DF9E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 703 404f25-404f3a 704 404ff0-404ff4 703->704 705 404f40-404f52 703->705 706 404f54-404f58 call 405d2e 705->706 707 404f5d-404f69 lstrlenA 705->707 706->707 709 404f86-404f8a 707->709 710 404f6b-404f7b lstrlenA 707->710 712 404f99-404f9d 709->712 713 404f8c-404f93 SetWindowTextA 709->713 710->704 711 404f7d-404f81 lstrcatA 710->711 711->709 714 404fe3-404fe5 712->714 715 404f9f-404fe1 SendMessageA * 3 712->715 713->712 714->704 716 404fe7-404fea 714->716 715->714 716->704
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000,0078FCF8,76132640,?,?,?,?,?,?,?,?,?,00402FD7,00000000,?), ref: 00404F5E
                                                                  • lstrlenA.KERNEL32(00402FD7,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000,0078FCF8,76132640,?,?,?,?,?,?,?,?,?,00402FD7,00000000), ref: 00404F6E
                                                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00402FD7,00402FD7,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,00000000,0078FCF8,76132640), ref: 00404F81
                                                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll), ref: 00404F93
                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FB9
                                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FD3
                                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FE1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsk6706.tmp\System.dll
                                                                  • API String ID: 2531174081-2239677815
                                                                  • Opcode ID: 8aca45e27811aa21f79b642ec133e9ff2e42e250cada4605035ec104fac27bf5
                                                                  • Instruction ID: b1dc6bec94ba42b715134808c0c3c35089c42976f802e7ea77bea70e7b84fba8
                                                                  • Opcode Fuzzy Hash: 8aca45e27811aa21f79b642ec133e9ff2e42e250cada4605035ec104fac27bf5
                                                                  • Instruction Fuzzy Hash: 1F21817190011DBFDF119FA5DD449DEBFA9EF45354F04807AFA04A6291C7388E409BA8

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 717 4053eb-405436 CreateDirectoryA 718 405438-40543a 717->718 719 40543c-405449 GetLastError 717->719 720 405463-405465 718->720 719->720 721 40544b-40545f SetFileSecurityA 719->721 721->718 722 405461 GetLastError 721->722 722->720
                                                                  APIs
                                                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040542E
                                                                  • GetLastError.KERNEL32 ref: 00405442
                                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405457
                                                                  • GetLastError.KERNEL32 ref: 00405461
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                                                                  • API String ID: 3449924974-2841175888
                                                                  • Opcode ID: f69d3160a82a2859f106a017fa20b71bd819ec85ae22b078452fa26fbc967781
                                                                  • Instruction ID: 8acfd36fb30660db29d177a8be8d7647adb8d58efdd4f3c758bfd1505ce0b010
                                                                  • Opcode Fuzzy Hash: f69d3160a82a2859f106a017fa20b71bd819ec85ae22b078452fa26fbc967781
                                                                  • Instruction Fuzzy Hash: CF010871D14259EADF119FA4D9447EFBFB8EF04315F004176E904B6290D378A644CFAA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 723 406037-406057 GetSystemDirectoryA 724 406059 723->724 725 40605b-40605d 723->725 724->725 726 40606d-40606f 725->726 727 40605f-406067 725->727 729 406070-4060a2 wsprintfA LoadLibraryExA 726->729 727->726 728 406069-40606b 727->728 728->729
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040604E
                                                                  • wsprintfA.USER32 ref: 00406087
                                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040609B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                  • String ID: %s%s.dll$UXTHEME$\
                                                                  • API String ID: 2200240437-4240819195
                                                                  • Opcode ID: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                  • Instruction ID: 17439860729f5247506b6fa79cc71e4dc0dc9fec6db89644704a68070b9bc3a3
                                                                  • Opcode Fuzzy Hash: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                  • Instruction Fuzzy Hash: BAF0F630A40209ABEB14EB78DC0DFEB365CAB08305F14017AB547F11D2EA78E8258B69

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 730 402e9f-402eb3 731 402eb5 730->731 732 402ebc-402ec5 730->732 731->732 733 402ec7 732->733 734 402ece-402ed3 732->734 733->734 735 402ee3-402ef0 call 40308e 734->735 736 402ed5-402ede call 4030a4 734->736 740 402ef6-402efa 735->740 741 40307c 735->741 736->735 742 402f00-402f26 GetTickCount 740->742 743 403027-403029 740->743 744 40307e-40307f 741->744 747 403084 742->747 748 402f2c-402f34 742->748 745 403069-40306c 743->745 746 40302b-40302e 743->746 749 403087-40308b 744->749 753 403071-40307a call 40308e 745->753 754 40306e 745->754 746->747 750 403030 746->750 747->749 751 402f36 748->751 752 402f39-402f47 call 40308e 748->752 755 403033-403039 750->755 751->752 752->741 764 402f4d-402f56 752->764 753->741 762 403081 753->762 754->753 759 40303b 755->759 760 40303d-40304b call 40308e 755->760 759->760 760->741 767 40304d-403059 call 405a26 760->767 762->747 766 402f5c-402f7c call 406188 764->766 772 402f82-402f95 GetTickCount 766->772 773 40301f-403021 766->773 774 403023-403025 767->774 775 40305b-403065 767->775 776 402f97-402f9f 772->776 777 402fda-402fdc 772->777 773->744 774->744 775->755 780 403067 775->780 781 402fa1-402fa5 776->781 782 402fa7-402fd2 MulDiv wsprintfA call 404f25 776->782 778 403013-403017 777->778 779 402fde-402fe2 777->779 778->748 786 40301d 778->786 784 402fe4-402feb call 405a26 779->784 785 402ff9-403004 779->785 780->747 781->777 781->782 787 402fd7 782->787 790 402ff0-402ff2 784->790 789 403007-40300b 785->789 786->747 787->777 789->766 791 403011 789->791 790->774 792 402ff4-402ff7 790->792 791->747 792->789
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CountTick$wsprintf
                                                                  • String ID: ... %d%%
                                                                  • API String ID: 551687249-2449383134
                                                                  • Opcode ID: 33bfaccbe10708ab9313bc663982b216744891cc0183e6082c5e200836cdbe48
                                                                  • Instruction ID: 2f6adf6c827ed57ff932280c4bcb171559557b12de80228d6f8143075edc11b6
                                                                  • Opcode Fuzzy Hash: 33bfaccbe10708ab9313bc663982b216744891cc0183e6082c5e200836cdbe48
                                                                  • Instruction Fuzzy Hash: 5D519E7280221AABDB10DF65DA44A9F7BB8AF00755F14417BFD10B32C4C7788E51DBAA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 793 4059ae-4059b8 794 4059b9-4059e4 GetTickCount GetTempFileNameA 793->794 795 4059f3-4059f5 794->795 796 4059e6-4059e8 794->796 798 4059ed-4059f0 795->798 796->794 797 4059ea 796->797 797->798
                                                                  APIs
                                                                  • GetTickCount.KERNEL32 ref: 004059C2
                                                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004059DC
                                                                  Strings
                                                                  • "C:\Users\user\Desktop\PO_203-25.exe", xrefs: 004059AE
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004059B1
                                                                  • nsa, xrefs: 004059B9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CountFileNameTempTick
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                  • API String ID: 1716503409-2955928933
                                                                  • Opcode ID: a71f6d19a672690ae76045f6a92713abfaab32ef542e638d1cc3651a1fbf987a
                                                                  • Instruction ID: 14833181556f01f8699e9ecebe408800633a5ab51cc0013a882439dab00eebba
                                                                  • Opcode Fuzzy Hash: a71f6d19a672690ae76045f6a92713abfaab32ef542e638d1cc3651a1fbf987a
                                                                  • Instruction Fuzzy Hash: 2AF0E232708204ABEB109F15EC04B9B7B9CDF91720F00C03BFA049A181D2B598448B58

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 799 100016bd-100016f9 call 10001a5d 803 1000180a-1000180c 799->803 804 100016ff-10001703 799->804 805 10001705-1000170b call 100021b0 804->805 806 1000170c-10001719 call 100021fa 804->806 805->806 811 10001749-10001750 806->811 812 1000171b-10001720 806->812 813 10001770-10001774 811->813 814 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 811->814 815 10001722-10001723 812->815 816 1000173b-1000173e 812->816 819 100017b2-100017b8 call 100023da 813->819 820 10001776-100017b0 call 10001559 call 100023da 813->820 840 100017b9-100017bd 814->840 817 10001725-10001726 815->817 818 1000172b-1000172c call 100027e8 815->818 816->811 821 10001740-10001741 call 10002aa3 816->821 824 10001733-10001739 call 10002589 817->824 825 10001728-10001729 817->825 831 10001731 818->831 819->840 820->840 834 10001746 821->834 839 10001748 824->839 825->811 825->818 831->834 834->839 839->811 843 100017fa-10001801 840->843 844 100017bf-100017cd call 100023a0 840->844 843->803 847 10001803-10001804 GlobalFree 843->847 849 100017e5-100017ec 844->849 850 100017cf-100017d2 844->850 847->803 849->843 852 100017ee-100017f9 call 100014e2 849->852 850->849 851 100017d4-100017dc 850->851 851->849 853 100017de-100017df FreeLibrary 851->853 852->843 853->849
                                                                  APIs
                                                                    • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                                                    • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                                                    • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                                                                  • GlobalFree.KERNEL32(00000000), ref: 10001768
                                                                  • FreeLibrary.KERNEL32(?), ref: 100017DF
                                                                  • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                    • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                                                    • Part of subcall function 10002589: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FB
                                                                    • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                  • String ID:
                                                                  • API String ID: 1791698881-3916222277
                                                                  • Opcode ID: ee4c9fc9ebc314f30cf8369a5322713cb2bdaef71cd7754c4cd252d6b1501433
                                                                  • Instruction ID: 7bd52774c71d274dd6e07030a7ef65efb9a892d3f5f2eddd47f658e3267813e4
                                                                  • Opcode Fuzzy Hash: ee4c9fc9ebc314f30cf8369a5322713cb2bdaef71cd7754c4cd252d6b1501433
                                                                  • Instruction Fuzzy Hash: B5319C79408205DAFB41DF649CC5BCA37ECFF042D5F018465FA0A9A09EDF78A8858B60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 856 40586c-405887 call 405d0c call 405817 861 405889-40588b 856->861 862 40588d-40589a call 405f77 856->862 863 4058df-4058e1 861->863 866 4058a6-4058a8 862->866 867 40589c-4058a0 862->867 869 4058be-4058c7 lstrlenA 866->869 867->861 868 4058a2-4058a4 867->868 868->861 868->866 870 4058c9-4058dd call 40577e GetFileAttributesA 869->870 871 4058aa-4058b1 call 406010 869->871 870->863 876 4058b3-4058b6 871->876 877 4058b8-4058b9 call 4057c5 871->877 876->861 876->877 877->869
                                                                  APIs
                                                                    • Part of subcall function 00405D0C: lstrcpynA.KERNEL32(?,?,00000400,0040319A,molarimeter Setup,NSIS Error), ref: 00405D19
                                                                    • Part of subcall function 00405817: CharNextA.USER32(?,?,Overmandede.Bri119,?,00405883,Overmandede.Bri119,Overmandede.Bri119,761336B0,?,C:\Users\user\AppData\Local\Temp\,004055CE,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405825
                                                                    • Part of subcall function 00405817: CharNextA.USER32(00000000), ref: 0040582A
                                                                    • Part of subcall function 00405817: CharNextA.USER32(00000000), ref: 0040583E
                                                                  • lstrlenA.KERNEL32(Overmandede.Bri119,00000000,Overmandede.Bri119,Overmandede.Bri119,761336B0,?,C:\Users\user\AppData\Local\Temp\,004055CE,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058BF
                                                                  • GetFileAttributesA.KERNELBASE(Overmandede.Bri119,Overmandede.Bri119,Overmandede.Bri119,Overmandede.Bri119,Overmandede.Bri119,Overmandede.Bri119,00000000,Overmandede.Bri119,Overmandede.Bri119,761336B0,?,C:\Users\user\AppData\Local\Temp\,004055CE,?,761336B0,C:\Users\user\AppData\Local\Temp\), ref: 004058CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\$Overmandede.Bri119
                                                                  • API String ID: 3248276644-3886236944
                                                                  • Opcode ID: 2b232cbcfe35a2a259e0e65083c3ab1013c8774cdbeba63489dc7f6696da3121
                                                                  • Instruction ID: 819bf3b96d2f33be72422b420245a44e5a303c51be7f34a106cb995fc7f4ae7e
                                                                  • Opcode Fuzzy Hash: 2b232cbcfe35a2a259e0e65083c3ab1013c8774cdbeba63489dc7f6696da3121
                                                                  • Instruction Fuzzy Hash: B7F0CD27115D5119E61632361C05ABF1A58CE82364718C53FFC51F22D1EA3C8862DD7E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 879 40549d-4054ce CreateProcessA 880 4054d0-4054d9 CloseHandle 879->880 881 4054dc-4054dd 879->881 880->881
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0079FD48,Error launching installer), ref: 004054C6
                                                                  • CloseHandle.KERNEL32(?), ref: 004054D3
                                                                  Strings
                                                                  • Error launching installer, xrefs: 004054B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess
                                                                  • String ID: Error launching installer
                                                                  • API String ID: 3712363035-66219284
                                                                  • Opcode ID: 9f0b0f85f0295080a22e5d155a7c66e390f8f607a8e504552004f12f3aafe87f
                                                                  • Instruction ID: 542db3fa263e6c3fd8363e81c561fcb1d1edc85eb607383f0aa2fc0e1be44d1e
                                                                  • Opcode Fuzzy Hash: 9f0b0f85f0295080a22e5d155a7c66e390f8f607a8e504552004f12f3aafe87f
                                                                  • Instruction Fuzzy Hash: 95E0BFF4A002097FEB10AB64ED45F7B7BACEB00645F108561FD10F6190D674A9549A79
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(80000002,00405E38,00000000,00000002,?,00000002,003DC9A1,?,00405E38,80000002,Software\Microsoft\Windows\CurrentVersion,003DC9A1,Call,00B7E919), ref: 00405C1C
                                                                  • RegQueryValueExA.KERNELBASE(003DC9A1,?,00000000,00405E38,003DC9A1,00405E38), ref: 00405C3D
                                                                  • RegCloseKey.KERNELBASE(?), ref: 00405C5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                                                  • Instruction ID: 82031ed88aedd54e8f4210183bcc3f8d35f395a35efeba70fd312e8ed480c043
                                                                  • Opcode Fuzzy Hash: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                                                  • Instruction Fuzzy Hash: AC014C7254420AEFDF118F64DC44ADB3FACEF18394B044026F91596220D235D964CBA5
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000), ref: 100028A7
                                                                  • GetLastError.KERNEL32 ref: 100029AE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastPointer
                                                                  • String ID:
                                                                  • API String ID: 2976181284-0
                                                                  • Opcode ID: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                                                                  • Instruction ID: 700bf99a33fcd989ee77f819fa46e2371db99389a88ce2eb288524e3b596c0af
                                                                  • Opcode Fuzzy Hash: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                                                                  • Instruction Fuzzy Hash: 9751A2BA908214DFFB10DF64DCC674937A4EB443D4F21842AEA08E726DCF34A9808B95
                                                                  APIs
                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: b63ad44f694a207690e677ec35bda8f999f5426b301403e6904e10af90410016
                                                                  • Instruction ID: 00097469377630013da62b9f7c31fbdee85021c234e60ac5accdaffcc3ed26dc
                                                                  • Opcode Fuzzy Hash: b63ad44f694a207690e677ec35bda8f999f5426b301403e6904e10af90410016
                                                                  • Instruction Fuzzy Hash: BE01F4316242209BF7194B389C04B6A3698E751354F10813BF811F62F1D678DC028B4D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?,?,?,00403156,00000009), ref: 004060B7
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004060D2
                                                                    • Part of subcall function 00406037: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040604E
                                                                    • Part of subcall function 00406037: wsprintfA.USER32 ref: 00406087
                                                                    • Part of subcall function 00406037: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040609B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                  • String ID:
                                                                  • API String ID: 2547128583-0
                                                                  • Opcode ID: ad31075058678b318fb1acd60a85244af91915838e2bda58b2d8d9f4dd3fd24d
                                                                  • Instruction ID: 3e97459997e7f7d7039c0cd31b40a13ca7cd82e20333033f2d5c91e802436a08
                                                                  • Opcode Fuzzy Hash: ad31075058678b318fb1acd60a85244af91915838e2bda58b2d8d9f4dd3fd24d
                                                                  • Instruction Fuzzy Hash: 9DE08632644121AAD32097749E0493B72ACAA84751302093EF506F2180D7389C21A669
                                                                  APIs
                                                                  • GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 00405983
                                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate
                                                                  • String ID:
                                                                  • API String ID: 415043291-0
                                                                  • Opcode ID: 8635a13517db9147ca88e6c1994c1e63e85e115acab2f3846d9047911b568965
                                                                  • Instruction ID: 2848333a8a5b20597e43067d17cc290ce391feab13c7f73248cb22e1b8f9cacf
                                                                  • Opcode Fuzzy Hash: 8635a13517db9147ca88e6c1994c1e63e85e115acab2f3846d9047911b568965
                                                                  • Instruction Fuzzy Hash: 5CD09E31658301AFEF098F20DD16F2EBAA2EB84B01F10962CBA82950E0D6755C159B26
                                                                  APIs
                                                                  • CreateDirectoryA.KERNELBASE(?,00000000,004030DF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 0040546E
                                                                  • GetLastError.KERNEL32 ref: 0040547C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectoryErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1375471231-0
                                                                  • Opcode ID: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                                  • Instruction ID: c55d8aa437131a95a01de78b0052dcd3d9cc3f447ee629d771dafcce0f52932c
                                                                  • Opcode Fuzzy Hash: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                                  • Instruction Fuzzy Hash: F5C04C30719601EAD6205B609E08B5B7D54AB54742F1045756546E10F0D6749451D92E
                                                                  APIs
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004030A1,00000000,00000000,00402EEE,000000FF,00000004,00000000,00000000,00000000), ref: 00405A0B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: FileRead
                                                                  • String ID:
                                                                  • API String ID: 2738559852-0
                                                                  • Opcode ID: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                                  • Instruction ID: ec62d6923e01247a1983afaeae7cc56c043784b3a51a97a909eefe23b1c45cc9
                                                                  • Opcode Fuzzy Hash: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                                  • Instruction Fuzzy Hash: CFE04F32210259AFCF10AE549C40EAB375CEB04250F004432F915E2040D230E8119FA8
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403057,00000000,007890F8,000000FF,007890F8,000000FF,000000FF,00000004,00000000), ref: 00405A3A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                  • Instruction ID: 202e9d0092b88ed1e300126467a6d0629c49e9ab1c26cc5f9aac99f6baf52130
                                                                  • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                  • Instruction Fuzzy Hash: FFE0EC3261425AAFDF10AEA59C44EEB7B6CFB05360F008533F915E2550D231E921DFA9
                                                                  APIs
                                                                  • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002729
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: ProtectVirtual
                                                                  • String ID:
                                                                  • API String ID: 544645111-0
                                                                  • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                                                  • Instruction ID: 4f82052a8ee677216feeb46ba648c84afb962adc58c95b92ee0d34447feb5494
                                                                  • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                                                  • Instruction Fuzzy Hash: B5F09BF19092A0DEF360DF688CC4B063FE4E3983D5B03892AE358F6269EB7441448B19
                                                                  APIs
                                                                  • SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 00403F4F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: fe9c5fbe97cae241cde84ce22785a5e9dbc0b02d0b9d793388d9d8a90b417260
                                                                  • Instruction ID: 9b9c13dac3056517ae90cab9ba0900707a7cdbddb9b58ac83e38e750941f619c
                                                                  • Opcode Fuzzy Hash: fe9c5fbe97cae241cde84ce22785a5e9dbc0b02d0b9d793388d9d8a90b417260
                                                                  • Instruction Fuzzy Hash: 39C04C71A442016AEB219B649D49F067BA8A751701F1594257315A50E0D674E410D66D
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E2D,0005E9E4), ref: 004030B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: FilePointer
                                                                  • String ID:
                                                                  • API String ID: 973152223-0
                                                                  • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                  • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                                                  • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                  • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                                                  APIs
                                                                  • SendMessageA.USER32(00000028,?,00000001,00403D57), ref: 00403F34
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend
                                                                  • String ID:
                                                                  • API String ID: 3850602802-0
                                                                  • Opcode ID: c60a5741adf6fd17905679b15365177ec5dfd851c523a537735145c0d793b3ca
                                                                  • Instruction ID: bce073d95cda9f80ae5a70f3258e8641f0ad27ed80faf677ac8523eeabb20274
                                                                  • Opcode Fuzzy Hash: c60a5741adf6fd17905679b15365177ec5dfd851c523a537735145c0d793b3ca
                                                                  • Instruction Fuzzy Hash: F7B09235585200AAEA224B40DD09F457A62A7A4701F008064B210240F0CAB200A0DB19
                                                                  APIs
                                                                  • KiUserCallbackDispatcher.NTDLL(?,00403CF0), ref: 00403F1D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CallbackDispatcherUser
                                                                  • String ID:
                                                                  • API String ID: 2492992576-0
                                                                  • Opcode ID: 0fd0461592f2d81c1c03ce05c628ae056ab63dad8406c1f23e4af249cfc5fe4d
                                                                  • Instruction ID: 7c635d8461ea366e4ce50998120561f43c0f0a4d26a99d582f7a8baadb7aa675
                                                                  • Opcode Fuzzy Hash: 0fd0461592f2d81c1c03ce05c628ae056ab63dad8406c1f23e4af249cfc5fe4d
                                                                  • Instruction Fuzzy Hash: 98A00176808101EBCB029B50FE08D4ABF62ABA4709B12D426E25594174D6365871FF2A
                                                                  APIs
                                                                  • GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: AllocGlobal
                                                                  • String ID:
                                                                  • API String ID: 3761449716-0
                                                                  • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                                                  • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                                                                  • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                                                  • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                                                                  APIs
                                                                  • lstrcpyA.KERNEL32(007A02D0,NUL,?,00000000,?,00000000,00405BE8,?,?), ref: 00405A64
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405BE8,?,?), ref: 00405A88
                                                                  • GetShortPathNameA.KERNEL32(?,007A02D0,00000400), ref: 00405A91
                                                                    • Part of subcall function 004058E4: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B41,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004058F4
                                                                    • Part of subcall function 004058E4: lstrlenA.KERNEL32(00000000,?,00000000,00405B41,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405926
                                                                  • GetShortPathNameA.KERNEL32(007A06D0,007A06D0,00000400), ref: 00405AAE
                                                                  • wsprintfA.USER32 ref: 00405ACC
                                                                  • GetFileSize.KERNEL32(00000000,00000000,007A06D0,C0000000,00000004,007A06D0,?,?,?,?,?), ref: 00405B07
                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405B16
                                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B4E
                                                                  • SetFilePointer.KERNEL32(004093B0,00000000,00000000,00000000,00000000,0079FED0,00000000,-0000000A,004093B0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BA4
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405BB5
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405BBC
                                                                    • Part of subcall function 0040597F: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 00405983
                                                                    • Part of subcall function 0040597F: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059A5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                  • String ID: %s=%s$NUL$[Rename]
                                                                  • API String ID: 222337774-4148678300
                                                                  • Opcode ID: 470faa373d492393558750a21a749fa660293524ffa589413fd4618ea5f3d9a4
                                                                  • Instruction ID: 28628270b370f13d709f2e98436788b9d19fd6dde28ce54c0a079e884eb7da61
                                                                  • Opcode Fuzzy Hash: 470faa373d492393558750a21a749fa660293524ffa589413fd4618ea5f3d9a4
                                                                  • Instruction Fuzzy Hash: 5A311371605B18ABD6206B215C89F6B3A6CDF45764F14013BFE01F22D2DA7CBC008EAD
                                                                  APIs
                                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\PO_203-25.exe",761336B0,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 00405FCF
                                                                  • CharNextA.USER32(?,?,?,00000000), ref: 00405FDC
                                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\PO_203-25.exe",761336B0,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 00405FE1
                                                                  • CharPrevA.USER32(?,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000,004030C7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 00405FF1
                                                                  Strings
                                                                  • "C:\Users\user\Desktop\PO_203-25.exe", xrefs: 00405FB3
                                                                  • *?|<>/":, xrefs: 00405FBF
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F78
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Char$Next$Prev
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 589700163-411735457
                                                                  • Opcode ID: ce3d7990729f771fdc32bb0ed1b54e2c2469674ae1568702cd8079844570f2a1
                                                                  • Instruction ID: e323e08bdfda0f150b574f83967a69ba6361760ee6a09b3ffc5edc4c10c5e242
                                                                  • Opcode Fuzzy Hash: ce3d7990729f771fdc32bb0ed1b54e2c2469674ae1568702cd8079844570f2a1
                                                                  • Instruction Fuzzy Hash: 01118F91808B926EFB3216244C44B7BAF898B577A4F18007BE5C5722C2DA7C5C429B6E
                                                                  APIs
                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00403F75
                                                                  • GetSysColor.USER32(00000000), ref: 00403F91
                                                                  • SetTextColor.GDI32(?,00000000), ref: 00403F9D
                                                                  • SetBkMode.GDI32(?,?), ref: 00403FA9
                                                                  • GetSysColor.USER32(?), ref: 00403FBC
                                                                  • SetBkColor.GDI32(?,?), ref: 00403FCC
                                                                  • DeleteObject.GDI32(?), ref: 00403FE6
                                                                  • CreateBrushIndirect.GDI32(?), ref: 00403FF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                  • String ID:
                                                                  • API String ID: 2320649405-0
                                                                  • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                                                  • Instruction ID: 03c35b03fdde5f33accd48f8e357bf0732577442a8f103693b6bf1e6191b16fb
                                                                  • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                                                  • Instruction Fuzzy Hash: 71216271904705ABCB219F68ED48B4BBFF8AF01715B04892AF996A22E0D734EA04CB55
                                                                  APIs
                                                                  • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                                                    • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C3
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E7
                                                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                                                                  • GlobalFree.KERNEL32(00000000), ref: 100022FB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 3730416702-0
                                                                  • Opcode ID: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                                                                  • Instruction ID: bfa8c22ebd78897ea4dc14f883c746723b208fa17a75ef0c69fbb79ff87ab60c
                                                                  • Opcode Fuzzy Hash: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                                                                  • Instruction Fuzzy Hash: B541ABB1108311EFF320DFA48884B5BB7F8FF443D1F218529F946D61A9DB34AA448B61
                                                                  APIs
                                                                    • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                                                  • GlobalFree.KERNEL32(?), ref: 100024B5
                                                                  • GlobalFree.KERNEL32(00000000), ref: 100024EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                                                                  • Instruction ID: 4e6b36a645f71e2aed4a85f2c36ff1861f2741140ba068ae73f9b0a79c1593cf
                                                                  • Opcode Fuzzy Hash: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                                                                  • Instruction Fuzzy Hash: EA319CB1504250EFF322CF64CCC4C6B7BBDEB852D4B124529FA4193168CB31AC94DB62
                                                                  APIs
                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B9A
                                                                  • MulDiv.KERNEL32(00114374,00000064,00115558), ref: 00402BC5
                                                                  • wsprintfA.USER32 ref: 00402BD5
                                                                  • SetWindowTextA.USER32(?,?), ref: 00402BE5
                                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BF7
                                                                  Strings
                                                                  • verifying installer: %d%%, xrefs: 00402BCF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                  • String ID: verifying installer: %d%%
                                                                  • API String ID: 1451636040-82062127
                                                                  • Opcode ID: 3ae07b054ad9b81f5b6108b272be1fee9de0c5ac9c6f7af5c303f160919c41b2
                                                                  • Instruction ID: 06d6233bfb864841df38fb05631849b064d35824abf3621066cb5e46443ac4cc
                                                                  • Opcode Fuzzy Hash: 3ae07b054ad9b81f5b6108b272be1fee9de0c5ac9c6f7af5c303f160919c41b2
                                                                  • Instruction Fuzzy Hash: EE014F70540209FBEF209F60DD4AEAE3B69AB04304F00803AFA16B92D0D7B8A951DB59
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: FreeGlobal
                                                                  • String ID:
                                                                  • API String ID: 2979337801-0
                                                                  • Opcode ID: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                                                                  • Instruction ID: adaf369aa6dab84e94bee76403d526b7d43184adb12fe210256c1aedb67fe499
                                                                  • Opcode Fuzzy Hash: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                                                                  • Instruction Fuzzy Hash: 43512536D04159AEFB55DFB488A4AEEBBF6EF453C0F124169E841B315DCA306E4087D2
                                                                  APIs
                                                                  • SetWindowTextA.USER32(00000000,molarimeter Setup), ref: 004039E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: TextWindow
                                                                  • String ID: "C:\Users\user\Desktop\PO_203-25.exe"$1033$molarimeter Setup
                                                                  • API String ID: 530164218-4071085286
                                                                  • Opcode ID: 85ceab019c87a04c69db0eea1a6fbc710d8651cdce0cfd73114f661218e3a08a
                                                                  • Instruction ID: a7121fc51e20562cbfa027eee4ba04e2135699cbca2cdd3690fce58e300c9c30
                                                                  • Opcode Fuzzy Hash: 85ceab019c87a04c69db0eea1a6fbc710d8651cdce0cfd73114f661218e3a08a
                                                                  • Instruction Fuzzy Hash: 8311D1B5B056108BE720DF15DC80A73776CEBC6755B28813FE841A73E1D73D9D028A98
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030D9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 00405784
                                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030D9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032DC), ref: 0040578D
                                                                  • lstrcatA.KERNEL32(?,00409014), ref: 0040579E
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 2659869361-3916508600
                                                                  • Opcode ID: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                                                  • Instruction ID: 68e0f27090206f37803ec84d28e37c7f09ebc5753c251fe5cd2e9e8878fbe2c1
                                                                  • Opcode Fuzzy Hash: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                                                  • Instruction Fuzzy Hash: 44D0A972606A307AE2022A15AC09E8F2A08CF62301B044433F200B22A2C63C4E418BFE
                                                                  APIs
                                                                  • CharNextA.USER32(?,?,Overmandede.Bri119,?,00405883,Overmandede.Bri119,Overmandede.Bri119,761336B0,?,C:\Users\user\AppData\Local\Temp\,004055CE,?,761336B0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405825
                                                                  • CharNextA.USER32(00000000), ref: 0040582A
                                                                  • CharNextA.USER32(00000000), ref: 0040583E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CharNext
                                                                  • String ID: Overmandede.Bri119
                                                                  • API String ID: 3213498283-3323112521
                                                                  • Opcode ID: b52e97735ebcacdda31b679af32a6ceda5c9d10ed76b2852ac30fc4ce6ba53e1
                                                                  • Instruction ID: db1d673f1cc138dbc44dca3842ff1338afb0bbfba97f9f865265ae6769849a0e
                                                                  • Opcode Fuzzy Hash: b52e97735ebcacdda31b679af32a6ceda5c9d10ed76b2852ac30fc4ce6ba53e1
                                                                  • Instruction Fuzzy Hash: 8AF06253908F916AFB3272350C84B6B5B89CB55351F1C847BEE41AA2D2827C58608F9A
                                                                  APIs
                                                                  • DestroyWindow.USER32(00000000,00000000,00402DE2,00000001), ref: 00402C15
                                                                  • GetTickCount.KERNEL32 ref: 00402C33
                                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402B7F,00000000), ref: 00402C50
                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402C5E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                  • String ID:
                                                                  • API String ID: 2102729457-0
                                                                  • Opcode ID: fd7178c7721e2cb8ae00692e9a41079980ecee2ccae2d9a286676897a8e6dfc8
                                                                  • Instruction ID: 945901cf9e20f70a46e78403882e62b60873afe576e8e7cbc1612cb0b63c5969
                                                                  • Opcode Fuzzy Hash: fd7178c7721e2cb8ae00692e9a41079980ecee2ccae2d9a286676897a8e6dfc8
                                                                  • Instruction Fuzzy Hash: 14F03A30809631ABD622AB34BF8EDDE7A64AB41B01B1184B7F014B21E4D77C58C6CBDD
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(?,761336B0,00000000,C:\Users\user\AppData\Local\Temp\,004035CF,004033E9,?), ref: 00403611
                                                                  • GlobalFree.KERNEL32(00BA66F0), ref: 00403618
                                                                  Strings
                                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004035F7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Free$GlobalLibrary
                                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                                  • API String ID: 1100898210-3916508600
                                                                  • Opcode ID: f64556832675c450ee94ce825956f3fa5fe3b9abfe3e42bbbd50814105250277
                                                                  • Instruction ID: f0c2977cb20e6558c2e773556eb83bc0584892ec035bd6653f77e23ad75a478d
                                                                  • Opcode Fuzzy Hash: f64556832675c450ee94ce825956f3fa5fe3b9abfe3e42bbbd50814105250277
                                                                  • Instruction Fuzzy Hash: 1DE0C233905120ABC6315F44FE0472A7B7CAF48B22F020067EC447B3A087786C528BCC
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO_203-25.exe,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 004057CB
                                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PO_203-25.exe,C:\Users\user\Desktop\PO_203-25.exe,80000000,00000003), ref: 004057D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CharPrevlstrlen
                                                                  • String ID: C:\Users\user\Desktop
                                                                  • API String ID: 2709904686-1669384263
                                                                  • Opcode ID: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                                                  • Instruction ID: d39d8f188df628cf061828239c0557f0f3bbaa41193ad9941d070ee56f497fe5
                                                                  • Opcode Fuzzy Hash: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                                                  • Instruction Fuzzy Hash: E5D0A772408D706EF30352109C04B8F6A48CF26300F090463F040A3191C27C5D424BBE
                                                                  APIs
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                                                                  • GlobalFree.KERNEL32(00000000), ref: 100011B4
                                                                  • GlobalFree.KERNEL32(?), ref: 100011C7
                                                                  • GlobalFree.KERNEL32(?), ref: 100011F5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1677585362.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                                  • Associated: 00000000.00000002.1677569064.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677601034.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1677619986.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_10000000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 1780285237-0
                                                                  • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                                                  • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                                                                  • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                                                  • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                                                                  APIs
                                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B41,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004058F4
                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040590C
                                                                  • CharNextA.USER32(00000000,?,00000000,00405B41,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040591D
                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405B41,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405926
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1662723368.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000000.00000002.1662175105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662755607.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1662811366.00000000007BA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1663345405.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 190613189-0
                                                                  • Opcode ID: d250403eeccc32afa1460bd507a63d74f6ad2c43926490d4129708a4008c1f50
                                                                  • Instruction ID: 7adaab352aa717b916c044831a99f4991ef712c09a2c9b56ba9fed1a583d178e
                                                                  • Opcode Fuzzy Hash: d250403eeccc32afa1460bd507a63d74f6ad2c43926490d4129708a4008c1f50
                                                                  • Instruction Fuzzy Hash: 43F09636505518FFC7129FA5DC0099EBBB8EF16360B2540B9F801F7360D674EE019BA9
                                                                  APIs
                                                                  • SetErrorMode.KERNEL32 ref: 00403111
                                                                  • GetVersion.KERNEL32 ref: 00403117
                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403140
                                                                  • #17.COMCTL32(00000007,00000009), ref: 00403162
                                                                  • OleInitialize.OLE32(00000000), ref: 00403169
                                                                  • SHGetFileInfoA.SHELL32(0079D500,00000000,?,00000160,00000000), ref: 00403185
                                                                  • GetCommandLineA.KERNEL32(007A1740,NSIS Error), ref: 0040319A
                                                                  • GetModuleHandleA.KERNEL32(00000000,007A8000,00000000), ref: 004031AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3911151176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3911135033.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911167225.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911186517.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: CommandErrorFileHandleInfoInitializeLineModeModuleVersionlstrlen
                                                                  • String ID: $NSIS Error$UXTHEME
                                                                  • API String ID: 165832124-3141987311
                                                                  • Opcode ID: 5830b95c4e7f2b9f509ff56a831fa7d428f7cdd4443f1b01361c4778ccf2bc9e
                                                                  • Instruction ID: 84bc29c81b7e4d8201cfe7f5d44e1c4e277843f8f73c5e9e6a7a15d160e829b4
                                                                  • Opcode Fuzzy Hash: 5830b95c4e7f2b9f509ff56a831fa7d428f7cdd4443f1b01361c4778ccf2bc9e
                                                                  • Instruction Fuzzy Hash: DF31B4B0808380AFE7216F60AD0DB1B7FA8AB46305F4045BEF585762D2C77C5905876F
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040604E
                                                                  • wsprintfA.USER32 ref: 00406087
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040609B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3911151176.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000003.00000002.3911135033.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911167225.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911186517.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.00000000007BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.00000000007FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000003.00000002.3911312872.000000000080E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_400000_PO_203-25.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                  • String ID: %s%s.dll$UXTHEME$\
                                                                  • API String ID: 2200240437-4240819195
                                                                  • Opcode ID: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                  • Instruction ID: 17439860729f5247506b6fa79cc71e4dc0dc9fec6db89644704a68070b9bc3a3
                                                                  • Opcode Fuzzy Hash: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                  • Instruction Fuzzy Hash: BAF0F630A40209ABEB14EB78DC0DFEB365CAB08305F14017AB547F11D2EA78E8258B69